Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
programming security » programming secrets, programming secure, programming recursion
evolution microarray » evolution micrornas, evolution microbial, annotation microarray
program evolution » program evalution, program evaluation, program execution
security program » security problems, security proofs, security proof
microarray https » microarrays https, microarray chips, microscopy https
programming security » programming secrets, programming secure, programming recursion
evolution microarray » evolution micrornas, evolution microbial, annotation microarray
program evolution » program evalution, program evaluation, program execution
security program » security problems, security proofs, security proof
microarray https » microarrays https, microarray chips, microscopy https
1
Published 2008
Table of Contents:
“... Expensive Functions -- Discriminant Analysis Methods for Microarray Data Classification...”View full text
Electronic
eBook
2
Published 2005
Table of Contents:
“... Security and an Application to File System Accesses -- Regular Papers -- A Machine Text-Inspired Machine...”View full text
Electronic
eBook



