History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 572 total

Beyond INSPIRE: An Ontology for Biodiversity Metadata Records. (English)
OTM Workshops, 597-607(2014)
WorldCat.org
1
Hand gestures to control infotainment equipment in cars. (English)
Intelligent Vehicles Symposium, 1-6(2014)
WorldCat.org
2
From requirements to statecharts via design refinement. (English)
SAC, 995-1000(2014)
WorldCat.org
3
Adaptively learning probabilistic deterministic automata from data streams. (English)
Machine LearningMachine Learning 96, N0. 1-2, 99-127(2014)
WorldCat.org
4
Uncertainty-Based Information Granule Formation. (English)
Recent Advances on Hybrid Approaches for Designing Intelligent Systems, 113-123(2014)
WorldCat.org
5
ARTFIBio: A cross-platform image registration tool for tumor response quantification in head and neck cancer. (English)
BHI, 149-152(2014)
WorldCat.org
6
Learning high-dimensional networks with nonlinear interactions by a novel tree-embedded graphical model. (English)
Pattern Recognition LettersPattern Recognition Letters 49, 207-213(2014)
WorldCat.org
8
Fuzzy granular gravitational clustering algorithm for multivariate data. (English)
Inf. Sci.Inf. Sci. 279, 498-511(2014)
WorldCat.org
9
LS-VisionDraughts: improving the performance of an agent for checkers by integrating computational intelligence, reinforcement learning and a powerful search method. (English)
Appl. Intell.Appl. Intell. 41, N0. 2, 525-550(2014)
WorldCat.org
10
A genetic tango attack against the David-Prasad RFID ultra-lightweight authentication protocol. (English)
Expert SystemsExpert Systems 31, N0. 1, 9-19(2014)
WorldCat.org
11
Preventive Maintenance of a Multi-State Device Subject to Internal Failure and Damage Due to External Shocks. (English)
IEEE Transactions on ReliabilityIEEE Transactions on Reliability 63, N0. 2, 646-660(2014)
WorldCat.org
12
Application of interval type-2 fuzzy neural networks in non-linear identification and time series prediction. (English)
Soft Comput.Soft Comput. 18, N0. 6, 1213-1224(2014)
WorldCat.org
13
Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol. (English)
J. Computational Applied MathematicsJ. Computational Applied Mathematics 259, 571-577(2014)
WorldCat.org
14
Information Design - Qualitative Approach for Corporative App in iPad. (English)
HCI (9), 203-212(2014)
WorldCat.org
15
Dendro: Collaborative Research Data Management Built on Linked Open Data. (English)
ESWC (Satellite Events), 483-487(2014)
WorldCat.org
16
Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections. (English)
ComputingComputing 96, N0. 9, 829-841(2014)
WorldCat.org
17
Air quality parameters outliers detection using functional data analysis in the Langreo urban area (Northern Spain). (English)
Applied Mathematics and ComputationApplied Mathematics and Computation 241, 1-10(2014)
WorldCat.org
18
Genetic Algorithm Optimization for Type-2 Non-singleton Fuzzy Logic Controllers. (English)
Recent Advances on Hybrid Approaches for Designing Intelligent Systems, 3-18(2014)
WorldCat.org
19
Assessing the Information Loss of Controlled Adjustment Methods in Two-Way Tables. (English)
Privacy in Statistical Databases, 11-23(2014)
WorldCat.org
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 572 total

Valid XHTML 1.0 Transitional Valid CSS!