Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
programme function » programming function, programme action, programs functional
https detection » stamps detection, nets detection, timps detection
function https » functions https, fiction https
method https » methods https
programme function » programming function, programme action, programs functional
https detection » stamps detection, nets detection, timps detection
function https » functions https, fiction https
method https » methods https
1
Published 2001
Table of Contents:
“... -- Functional Defect Conferred by the Parkinson's Disease-Causing ?-Synuclein (Ala30Pro) Mutation -- Molecular...”View full text
Electronic
eBook
2
Published 2011
Table of Contents:
“... Posttranslational Modifications on Lysine Residues -- Multiplexed Detection of Antibodies Using Programmable Bead...”View full text
Electronic
eBook
3
Published 2006
Table of Contents:
“... -- On the Choice of the Kernel Function in Kernel Discriminant Analysis Using Information Complexity -- Growing...”View full text
Electronic
eBook
4
by Abdul Karim, Julia, Lanyau, Tony, Maskin, Masleha, Anuar, M. A. S., Che Soh, Azura, Abdul Rahman, Ribhan Zafira
Published 2020
“... sure it is functioning and running accordingly. The late detection of faults may result in accidents...”Published 2020
View full text
Article
5
Published 2015
Table of Contents:
“... with Programmable Scalar Contribution Function -- Real-Time locating Method for Palmvein Image Acquisition -- Real...”View full text
Electronic
eBook
6
Published 2015
Table of Contents:
“... with Programmable Scalar Contribution Function -- Real-Time locating Method for Palmvein Image Acquisition -- Real...”View full text
Electronic
eBook
7
Published 2008
Table of Contents:
“..., Methodology and Functionality -- Electromagnetic Interactions of Particles with Matter -- The Geant4...”View full text
Electronic
eBook
8
Published 2006
Table of Contents:
“... for Medical Image Using a Statistical Initial Process and a Level Set Method -- Leukocyte Detection Using...”View full text
Electronic
eBook
9
Published 2014
Table of Contents:
“... Screening Outcomes -- The Impact of Introducing Full Field Digital Mammography into a Screening Programme...”View full text
Electronic
eBook
10
Published 2010
Table of Contents:
“...- and ANBDmem-Encoding: Detecting Hardware Errors in Software -- Session 5 -- Field Test Methods for a Co...”View full text
Electronic
eBook
11
Published 2010
Table of Contents:
“... Approach Using Burr’s Distribution Function for High Speed On-Chip RC Interconnects -- Wavelet-Domain L...”View full text
Electronic
eBook
12
Published 2010
Table of Contents:
“... Random Fields and Their Application to Intrusion Detection -- Generalized Derivative Based Kernelized...”View full text
Electronic
eBook
13
Published 2006
Table of Contents:
“...) Probability Function for FMS IP Trace-Back Technique -- A Mechanism for Detection and Prevention...”View full text
Electronic
eBook
14
Published 2005
Table of Contents:
“... Equation Models with the PLS-VB Programme -- Web Robot Detection - Preprocessing Web Logfiles for Robot...”View full text
Electronic
eBook
15
Published 2011
Table of Contents:
“... functionalization on the fatigue resistance of aluminum lap joints, by I.D. Rosca, R. Mactabi, S.V. Hoa -- Fatigue...”View full text
Electronic
eBook
16
Table of Contents:
“... -- Cascade-Based Synthesis -- Encoding Method -- Functions with Small C-Measures -- C-Measure of Sparse...”
View full text
View full text
Electronic
eBook
17
Published 2012
Table of Contents:
“...-Erik Persson -- 2 The Engineering Mathematics Study Programme in Lund - Background and Implementation...”View full text
Electronic
eBook
18
Published 2012
Table of Contents:
“... Investigations.- An Efficient Filtering Method for Detecting Malicous Web Pages.- Lightweight Client-Side Methods...”View full text
Electronic
eBook
19
Published 2014
Table of Contents:
“...Detecting Integrity Attacks on Industrial Control Systems -- Detecting Malicious Software Execution...”View full text
Electronic
eBook
20
Published 2014
Table of Contents:
“... -- Exploring Chaotic Neural Network for Cryptographic Hash Function -- Protocol to Authenticate the Objects...”View full text
Electronic
eBook



