History
1
494

Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 494 total

Foundations of coding. Compression, encryption, error correction. (English)
Hoboken, NJ: John Wiley \& Sons (ISBN 978-1-118-88144-6/hbk; 978-1-119-00594-0/ebook). xviii, 355~p. EUR~95.90 (2015).
1
Symbolic control of monotone systems application to ventilation regulation in buildings. (English)
HSCC, 281-282(2015)
2
Extension Enforcement in Abstract Argumentation as an Optimization Problem. (English)
IJCAI, 2876-2882(2015)
3
Abstraction of levels of abstraction. (English)
J. Exp. Theor. Artif. Intell.J. Exp. Theor. Artif. Intell. 27, N0. 1, 23-35(2015)
4
Toward memory scalability of GYSELA code for extreme scale computers. (English)
Concurrency and Computation: Practice and ExperienceConcurrency and Computation: Practice and Experience 27, N0. 4, 994-1009(2015)
5
New filtering for AtMostNValue and its weighted variant: A Lagrangian approach. (English)
ConstraintsConstraints 20, N0. 3, 362-380(2015)
6
Content-Based Discovery of Multiple Structures from Episodes of Recurrent TV Programs Based on Grammatical Inference. (English)
MMM (1), 140-154(2015)
7
Mining processes with multi-instantiation. (English)
SAC, 1231-1237(2015)
8
Semantic Web based Named Entity Linking for Digital Humanities and Heritage Texts. (English)
SW4SHD@ESWC, 77-88(2015)
9
Computing the Rank Profile Matrix. (English)
ISSAC, 149-156(2015)
10
Unsupervised named entity recognition and disambiguation: an application to old French journals. (English)
Perner, Petra (ed.), Advances in data mining. Applications and theoretical aspects. 14th industrial conference, ICDM 2014, St. Petersburg, Russia, July 16‒20, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-08975-1/pbk). Lecture Notes in Computer Science 8557. Lecture Notes in Artificial Intelligence, 12-23 (2014).
11
Matrix multiplication over word-size modular fields using Bini’s approximate formula. (English)
ACM Commun. Comput. Algebra 48, No. 3-4, 100-102 (2014).
12
Parallel computation of echelon forms. (English)
Silva, Fernando (ed.) et al., Euro-Par 2014 parallel processing. 20th international conference, Porto, Portugal, August 25‒29, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-09872-2/pbk). Lecture Notes in Computer Science 8632, 499-510 (2014).
13
GLV/GLS decomposition, power analysis, and attacks on ECDSA signatures with single-bit nonce bias. (English)
Sarkar, Palash (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7‒11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 262-281 (2014).
14
A translation-based approach for revision of argumentation frameworks. (English)
Fermé, Eduardo (ed.) et al., Logics in artificial intelligence. 14th European conference, JELIA 2014, Funchal, Madeira, Portugal, September 24‒26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-11557-3/pbk). Lecture Notes in Computer Science 8761. Lecture Notes in Artificial Intelligence, 397-411 (2014).
15
Classes of infinite $(\leq 3, ω, ω^\ast, Ω, Ω^\ast)$-hypomorphy. (Classes de $(\leq 3,ω,ω^\ast,Ω, Ω^\ast)$-hypomorphie infinies.) (French)
Proyecciones 33, No. 3, 287-313 (2014).
16
Elements of design for containers and solutions in the LinBox library (extended abstract). (English)
Hong, Hoon (ed.) et al., Mathematical software ‒ ICMS 2014. 4th international congress, Seoul, South Korea, August 5‒9, 2014. Proceedings. Berlin: Springer (ISBN 978-3-662-44198-5/pbk). Lecture Notes in Computer Science 8592, 654-662 (2014).
17
Static analysis of programs with imprecise probabilistic inputs. (English)
Cohen, Ernie (ed.) et al., Verified software: theories, tools, experiments. 5th international conference, VSTTE 2013, Menlo Park, CA, USA, May 17‒19, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-642-54107-0/pbk). Lecture Notes in Computer Science 8164, 22-47 (2014).
18
Filtering AtMostNValue with difference constraints: application to the shift minimisation personnel task scheduling problem. (English)
Artif. Intell. 212, 116-133 (2014).
19
Reliability of functional magnetic resonance imaging activation during working memory in a multi-site study: Analysis from the North American Prodrome Longitudinal Study. (English)
NeuroImageNeuroImage 97, 41-52(2014)
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 494 total