Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
programming security » programming secrets, programming secure, programming recursion
security microarray » series microarray
programming active » programming native, programming practice, programming inductive
active programming » reactive programming, action programming, adaptive programming
microarray https » microarrays https, microarray chips, microscopy https
programming security » programming secrets, programming secure, programming recursion
security microarray » series microarray
programming active » programming native, programming practice, programming inductive
active programming » reactive programming, action programming, adaptive programming
microarray https » microarrays https, microarray chips, microscopy https
1
Published 2008
Table of Contents:
“... for Mining Subtle Signals in Time Course Microarray Data -- A PTAS for the k-Consensus Structures Problem...”View full text
Electronic
eBook
2
Published 2010
Table of Contents:
“... for Broadcast Tennis Video -- Twittering for Earth: A Study on the Impact of Microblogging Activism on Earth...”View full text
Electronic
eBook
3
Published 2007
Table of Contents:
“... Tolerant Algorithm Based on Active Replication -- An Algorithm for Improving Hilbert-Huang Transform...”View full text
Electronic
eBook
4
Published 2010
Table of Contents:
“... Freshness Based Persistent Assurance Scheme for Secure Scalable Media Distribution -- Cooperative Decision...”View full text
Electronic
eBook
5
Published 2014
Table of Contents:
“... Seizures -- Active Region Approach for Segmentation of Medical Images -- SCM-driven Tree View...”View full text
Electronic
eBook
6
Published 2007
Table of Contents:
“... Systems -- Evaluation of Security Mechanisms for Virtual Organizations -- Non-Repudiable and Repudiable...”View full text
Electronic
eBook



