Tópicos Sugeridos dentro de su búsqueda.
Tópicos Sugeridos dentro de su búsqueda.
Buscar alternativas:
programming security » programming secrets, programming secure, programming recursion
security program » security problems, security proofs, security proof
using microarray » using microarrays, dna microarray, cdna microarray
microarray https » microarrays https, microarray chips, microscopy https
program using » programs using, programming using
programming security » programming secrets, programming secure, programming recursion
security program » security problems, security proofs, security proof
using microarray » using microarrays, dna microarray, cdna microarray
microarray https » microarrays https, microarray chips, microscopy https
program using » programs using, programming using
1
Publicado 2008
Tabla de Contenidos:
“... Filtering -- An AI-Based Causal Strategy for Securing Statistical Databases Using Micro-aggregation...”Enlace del recurso
Electrónico
eBook
2
Publicado 2007
Tabla de Contenidos:
“... -- Constraints Solution for Time Sensitive Security Protocols -- Using Bit Selection to Do Routing Table Lookup...”Enlace del recurso
Electrónico
eBook
3
Publicado 2010
Tabla de Contenidos:
“... Hour 2009 in Australia -- Student Courses Recommendation Using Ant Colony Optimization -- Web Ontology...”Enlace del recurso
Electrónico
eBook
4
Publicado 2008
Tabla de Contenidos:
“... for Mining Subtle Signals in Time Course Microarray Data -- A PTAS for the k-Consensus Structures Problem...”Enlace del recurso
Electrónico
eBook
5
Publicado 2007
Tabla de Contenidos:
“... Collaborative Teaching Approach Using Integrated Electronic Environments for Information Security -- Research...”Enlace del recurso
Electrónico
eBook
6
Publicado 2010
Tabla de Contenidos:
“...Cooperative Applications -- Using Tag Clouds to Promote Community Awareness in Research...”Enlace del recurso
Electrónico
eBook
7
Publicado 2011
Tabla de Contenidos:
“... Computing -- Architecting Data-Intensive Software Systems -- ECL: A High-Level Programming Language for Data...”Enlace del recurso
Electrónico
eBook
8
Publicado 2005
Tabla de Contenidos:
“... Security and an Application to File System Accesses -- Regular Papers -- A Machine Text-Inspired Machine...”Enlace del recurso
Electrónico
eBook
9
Publicado 2007
Tabla de Contenidos:
“... for Screening of Oral Cancer Using Laser Induced Fluorescence -- Tongueprint Feature Extraction and Application...”Enlace del recurso
Electrónico
eBook
10
Publicado 2010
Tabla de Contenidos:
“...) -- Efficient Grid on the OTIS-Arrangment Network -- Single Thread Program Parallelism with Dataflow Abstracting...”Enlace del recurso
Electrónico
eBook
11
Publicado 2014
Tabla de Contenidos:
“... for Microarray Data -- New Method for Dynamic Signature Verification Using Hybrid Partitioning -- New Method...”Enlace del recurso
Electrónico
eBook
12
Publicado 2008
Tabla de Contenidos:
“... Integrated Microarray Data -- Using Data Mining for Dynamic Level Design in Games -- A Logic Programming...”Enlace del recurso
Electrónico
eBook
13
Publicado 2007
Tabla de Contenidos:
“... Microarray Experiments to Pathway Analysis Through the Use of Gene Ontology Terms -- Gene Expression Analysis...”Enlace del recurso
Electrónico
eBook



