1
Published 2010
Table of Contents: ... -- Biodiversity patterns and trophic interactions in human-dominated tropical landscapes in Sulawesi (Indonesia...
View full text
Electronic eBook
2
Published 2008
Table of Contents: ... Views for Visual Exploration -- Linked Data Views -- Visualizing Trees and Forests -- Methodologies...
View full text
Electronic eBook
3
Published 2010
Table of Contents: ... and Implementations for Coroutines -- Liberal Typing for Functional Logic Programs -- Session 2 -- A Provably Correct...
View full text
Electronic eBook
4
Published 2010
Table of Contents: ...Bridging Calculus and Statistics: Null - Hypotheses Underlain by Functional Equations...
View full text
Electronic eBook
5
Published 2005
Table of Contents: ... in Exploiting Dependent And-Parallelism in Logic Programming: Leftness Detection in Dynamic Search Trees...
View full text
Electronic eBook
6
Published 2008
Table of Contents: ... Procedures -- Session 2: Specific Theories -- Proving Bounds on Real-Valued Functions with Computations...
View full text
Electronic eBook
7
Published 2008
Table of Contents: ... Frequent-Pattern Tree -- Dichotomy Method toward Interactive Testing-Based Fault Localization...
View full text
Electronic eBook
8
Published 2013
Table of Contents: ... Recognition Based on Linear Discriminant Analysis -- Association Measures and Aggregation Functions -- JT2FIS...
View full text
Electronic eBook
9
Published 2010
Table of Contents: ...Multimodal Human Spacecraft Interaction in Remote Environments -- A Framework for Collaborative...
View full text
Electronic eBook
10
Published 2013
Table of Contents: ... on Probability-Possibility Transformation -- Functional Verification of Class Invariants in CleanJava...
View full text
Electronic eBook
11
Published 2010
Table of Contents: ... -- Typing Asymmetric Client-Server Interaction -- Equational Reasoning on Ad Hoc Networks -- Towards a...
View full text
Electronic eBook
12
Published 2008
Table of Contents: ...1. ABZ Invited Talks -- Complex Hardware Modules Can Now be Made Free of Functional Errors without...
View full text
Electronic eBook
13
Published 2014
Table of Contents: ... -- Exploring Chaotic Neural Network for Cryptographic Hash Function -- Protocol to Authenticate the Objects...
View full text
Electronic eBook
14
Published 2007
Table of Contents: ... Personal Networks over Heterogeneous Ad-hoc Scenarios -- Analysis of Algorithms for Radial Basis Function...
View full text
Electronic eBook