Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
programming exploring » programming exploits, programme exploring, programming developing
exploring microarray » exploratory microarray, exploring microsoft, analyzing microarray
programming secure » programming security, programming secrets, programming feature
secure programming » recursive programming, cone programming, structured programming
microarray https » microarrays https, microarray chips, microscopy https
programming exploring » programming exploits, programme exploring, programming developing
exploring microarray » exploratory microarray, exploring microsoft, analyzing microarray
programming secure » programming security, programming secrets, programming feature
secure programming » recursive programming, cone programming, structured programming
microarray https » microarrays https, microarray chips, microscopy https
1
Published 2010
Table of Contents:
“... Similarity Measures Based on Hybrid Features -- Exploring Wikipedia and Text Features for Named Entity...”View full text
Electronic
eBook
2
Published 2010
Table of Contents:
“... Freshness Based Persistent Assurance Scheme for Secure Scalable Media Distribution -- Cooperative Decision...”View full text
Electronic
eBook
3
Published 2011
Table of Contents:
“... Computing -- Architecting Data-Intensive Software Systems -- ECL: A High-Level Programming Language for Data...”View full text
Electronic
eBook
4
Published 2008
Table of Contents:
“... Integrated Microarray Data -- Using Data Mining for Dynamic Level Design in Games -- A Logic Programming...”View full text
Electronic
eBook
5
Published 2007
Table of Contents:
“... SPECT -- Constructing the Histogram Representation for Automatic Gridding of cDNA Microarray Images...”View full text
Electronic
eBook
6
Published 2007
Table of Contents:
“... Systems -- Evaluation of Security Mechanisms for Virtual Organizations -- Non-Repudiable and Repudiable...”View full text
Electronic
eBook



