Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
programming applications » processing applications
applications programming » application programming, application program, applications proceedings
programming security » programming secrets, programming secure, programming recursion
security microarray » series microarray
microarray https » microarrays https, microarray chips, microscopy https
programming applications » processing applications
applications programming » application programming, application program, applications proceedings
programming security » programming secrets, programming secure, programming recursion
security microarray » series microarray
microarray https » microarrays https, microarray chips, microscopy https
1
Published 2008
Table of Contents:
“... Expensive Functions -- Discriminant Analysis Methods for Microarray Data Classification...”View full text
Electronic
eBook
2
Published 2010
Table of Contents:
“... on Approaches for Business-to-Business Integration -- Tools and Applications -- Evolving Concurrent Petri Net...”View full text
Electronic
eBook
3
Published 2007
Table of Contents:
“...Geometric Algorithms for the Constrained 1-D K-Means Clustering Problems and IMRT Applications -- A...”View full text
Electronic
eBook
4
Published 2008
Table of Contents:
“... Splitting, with Applications in Intensity-Modulated Radiation Therapy -- A Practical Parameterized Algorithm...”View full text
Electronic
eBook
5
Published 2010
Table of Contents:
“...Cooperative Applications -- Using Tag Clouds to Promote Community Awareness in Research...”View full text
Electronic
eBook
6
Published 2011
Table of Contents:
“... for Mining High-Dimensional DNA Microarray Data -- Application of Random Matrix Theory to Analyze Biological...”View full text
Electronic
eBook
7
Published 2007
Table of Contents:
“... for Uncertainty Reduction in Microarray Gene Expression Pattern Analysis -- Application of Classification Methods...”View full text
Electronic
eBook
8
Published 2005
Table of Contents:
“... Security and an Application to File System Accesses -- Regular Papers -- A Machine Text-Inspired Machine...”View full text
Electronic
eBook
9
Published 2014
Table of Contents:
“... for Microarray Data -- New Method for Dynamic Signature Verification Using Hybrid Partitioning -- New Method...”View full text
Electronic
eBook
10
Published 2008
Table of Contents:
“... Integrated Microarray Data -- Using Data Mining for Dynamic Level Design in Games -- A Logic Programming...”View full text
Electronic
eBook
11
Published 2010
Table of Contents:
“...) -- Efficient Grid on the OTIS-Arrangment Network -- Single Thread Program Parallelism with Dataflow Abstracting...”View full text
Electronic
eBook
12
Published 2007
Table of Contents:
“... for Screening of Oral Cancer Using Laser Induced Fluorescence -- Tongueprint Feature Extraction and Application...”View full text
Electronic
eBook
13
Published 2007
Table of Contents:
“... Systems -- Evaluation of Security Mechanisms for Virtual Organizations -- Non-Repudiable and Repudiable...”View full text
Electronic
eBook



