Found: 81
Select item for more details and to access through your institution.
Transparency and reproducibility in data analysis: the Prostate Cancer Prevention Trial.
- Published in:
- Biostatistics, 2010, v. 11, n. 3, p. 413, doi. 10.1093/biostatistics/kxq004
- By:
- Publication type:
- Article
Binocular imaging of a laser stripe and approximation networks for shape detection.
- Published in:
- International Journal of Imaging Systems & Technology, 2007, v. 17, n. 2, p. 62
- By:
- Publication type:
- Article
Multiobjective Optimisation Problem of Regional Power Electric Networks Development.
- Published in:
- International Review on Modelling & Simulations, 2010, v. 3, n. 5, p. 852
- By:
- Publication type:
- Article
The Outer-connected Domination Number of Sierpiński-like Graphs.
- Published in:
- Theory of Computing Systems, 2016, v. 58, n. 2, p. 345, doi. 10.1007/s00224-015-9621-9
- By:
- Publication type:
- Article
Optimization of Compound Ranking for Structure-Based Virtual Ligand Screening Using an Established FRED-Surflex Consensus Approach.
- Published in:
- Chemical Biology & Drug Design, 2014, v. 83, n. 1, p. 37, doi. 10.1111/cbdd.12202
- By:
- Publication type:
- Article
An evolutionary approach for achieving scalability with general regression neural networks.
- Published in:
- Natural Computing, 2009, v. 8, n. 1, p. 133, doi. 10.1007/s11047-007-9052-x
- By:
- Publication type:
- Article
A divide-and-conquer recursive approach for scaling up instance selection algorithms.
- Published in:
- Data Mining & Knowledge Discovery, 2009, v. 18, n. 3, p. 392, doi. 10.1007/s10618-008-0121-2
- By:
- Publication type:
- Article
Mobile IP-Based Protocol for Wireless Personal Area Networks in Critical Environments.
- Published in:
- Wireless Personal Communications, 2011, v. 61, n. 4, p. 711, doi. 10.1007/s11277-011-0428-y
- By:
- Publication type:
- Article
Adaptive Distributed Channel Assignment in Wireless Mesh Networks.
- Published in:
- Wireless Personal Communications, 2008, v. 47, n. 3, p. 363, doi. 10.1007/s11277-008-9484-3
- By:
- Publication type:
- Article
Statistical aspects of rainfall fields in Southern Italy during a rain enhancement experiment.
- Published in:
- Environmetrics, 2006, v. 17, n. 8, p. 777, doi. 10.1002/env.793
- By:
- Publication type:
- Article
Mobile gSET—secure business workflows for Mobile-Grid clients.
- Published in:
- Concurrency & Computation: Practice & Experience, 2010, v. 22, n. 14, p. 2036, doi. 10.1002/cpe.1437
- By:
- Publication type:
- Article
Radio planning and coverage optimization of 3G cellular networks.
- Published in:
- Wireless Networks (10220038), 2008, v. 14, n. 4, p. 435, doi. 10.1007/s11276-006-0729-3
- By:
- Publication type:
- Article
On the scalability of IEEE 802.11 ad-hoc-mode timing synchronization function.
- Published in:
- Wireless Networks (10220038), 2008, v. 14, n. 4, p. 479, doi. 10.1007/s11276-006-0732-8
- By:
- Publication type:
- Article
INDEX-MAXMINER:: A NEW MAXIMAL FREQUENT ITEMSET MINING ALGORITHM.
- Published in:
- International Journal on Artificial Intelligence Tools, 2008, v. 17, n. 2, p. 303, doi. 10.1142/S021821300800390X
- By:
- Publication type:
- Article
Transferring Data Between Any Two UDDI v3 - Compliant Repositories - K.A.L.I.N.A. Data Migration.
- Published in:
- International Review on Computers & Software, 2007, v. 2, n. 4, p. 382
- By:
- Publication type:
- Article
Discovering relationship types between users using profiles and shared photos in a social network.
- Published in:
- Multimedia Tools & Applications, 2013, v. 64, n. 1, p. 141, doi. 10.1007/s11042-011-0853-7
- By:
- Publication type:
- Article
Reconstruction from Projections Using Grassmann Tensors.
- Published in:
- International Journal of Computer Vision, 2009, v. 83, n. 3, p. 274, doi. 10.1007/s11263-009-0225-1
- By:
- Publication type:
- Article
Translated Poisson Mixture Model for Stratification Learning.
- Published in:
- International Journal of Computer Vision, 2008, v. 80, n. 3, p. 358, doi. 10.1007/s11263-008-0144-6
- By:
- Publication type:
- Article
An overview of the verification of SET.
- Published in:
- International Journal of Information Security, 2005, v. 4, n. 1/2, p. 17, doi. 10.1007/s10207-004-0047-7
- By:
- Publication type:
- Article
Penetration of e-Transactions in Odisha: Issues, Challenges and the Way Forward.
- Published in:
- IUP Journal of Information Technology, 2016, v. 12, n. 3, p. 7
- By:
- Publication type:
- Article
Efficient Mobile Authentication Scheme Preserving User Privacy for Large-Scale Wireless Networks.
- Published in:
- Adhoc & Sensor Wireless Networks, 2013, v. 17, n. 3/4, p. 313
- By:
- Publication type:
- Article
Approximation Algorithms for Maximum Weight Independent Set of Links Under the SINR Model.
- Published in:
- Adhoc & Sensor Wireless Networks, 2013, v. 17, n. 3/4, p. 293
- By:
- Publication type:
- Article
Fast local search for the maximum independent set problem.
- Published in:
- Journal of Heuristics, 2012, v. 18, n. 4, p. 525, doi. 10.1007/s10732-012-9196-4
- By:
- Publication type:
- Article
Analysis and Characterization of Asynchronous State Transition Graphs Using Extremal States.
- Published in:
- Bulletin of Mathematical Biology, 2013, v. 75, n. 6, p. 920, doi. 10.1007/s11538-012-9782-5
- By:
- Publication type:
- Article
Static Replication Strategies for Content Availability in Vehicular Ad-hoc Networks.
- Published in:
- Mobile Networks & Applications, 2009, v. 14, n. 5, p. 590, doi. 10.1007/s11036-008-0120-y
- By:
- Publication type:
- Article
An Inter-cluster Communication based Energy Aware and Fault Tolerant Protocol for Wireless Sensor Networks.
- Published in:
- Mobile Networks & Applications, 2008, v. 13, n. 6, p. 614, doi. 10.1007/s11036-008-0093-x
- By:
- Publication type:
- Article
Call Forwarding-Based Active Probing for POTS Fault Isolation.
- Published in:
- Journal of Network & Systems Management, 2008, v. 16, n. 2, p. 145, doi. 10.1007/s10922-007-9076-7
- By:
- Publication type:
- Article
On a Self-Organizing Multipath Routing Protocol in MobileWireless Networks.
- Published in:
- Journal of Network & Systems Management, 2006, v. 14, n. 1, p. 103, doi. 10.1007/s10922-005-9017-2
- By:
- Publication type:
- Article
Network lifetime maximization for time-sensitive data gathering in wireless sensor networks with a mobile sink.
- Published in:
- Wireless Communications & Mobile Computing, 2013, v. 13, n. 14, p. 1263, doi. 10.1002/wcm.1179
- By:
- Publication type:
- Article
Formal Analysis of SET and NSL Protocols Using the Interpretation Functions-Based Method.
- Published in:
- Journal of Computer Networks & Communications, 2012, p. 1, doi. 10.1155/2012/254942
- By:
- Publication type:
- Article
On Traffic Load Distribution and Load Balancing in Dense Wireless Multihop Networks.
- Published in:
- EURASIP Journal on Wireless Communications & Networking, 2007, p. 1, doi. 10.1155/2007/16932
- By:
- Publication type:
- Article
New dominating sets in social networks.
- Published in:
- Journal of Global Optimization, 2010, v. 48, n. 4, p. 633, doi. 10.1007/s10898-009-9511-2
- By:
- Publication type:
- Article
Survivable network design under optimal and heuristic interdiction scenarios.
- Published in:
- Journal of Global Optimization, 2007, v. 38, n. 2, p. 181, doi. 10.1007/s10898-006-9067-3
- By:
- Publication type:
- Article
Using neural networks to predict surface zooplankton biomass along a 50°N to 50°S transect of the Atlantic.
- Published in:
- Journal of Plankton Research, 2001, v. 23, n. 8, p. 875, doi. 10.1093/plankt/23.8.875
- By:
- Publication type:
- Article
Extended ASP Tableaux and rule redundancy in normal logic programs1.
- Published in:
- Theory & Practice of Logic Programming, 2008, v. 8, n. 5/6, p. 691, doi. 10.1017/S1471068408003578
- By:
- Publication type:
- Article
FUNDAMENTAL LAW NETWORK.
- Published in:
- Journal of Applied Global Research, 2011, v. 4, n. 11, p. 44
- By:
- Publication type:
- Article
Sequential Diagnosis by Abstraction.
- Published in:
- Journal of Artificial Intelligence Research, 2011, v. 41, p. 329, doi. 10.1613/jair.3296
- By:
- Publication type:
- Article
Set Intersection and Consistency in Constraint Networks.
- Published in:
- Journal of Artificial Intelligence Research, 2006, v. 27, p. 441, doi. 10.1613/jair.2058
- By:
- Publication type:
- Article
Iterative classification for multiple target attributes.
- Published in:
- Journal of Intelligent Information Systems, 2013, v. 40, n. 2, p. 283, doi. 10.1007/s10844-012-0224-5
- By:
- Publication type:
- Article
Validation tools for variable subset regression.
- Published in:
- Journal of Computer-Aided Molecular Design, 2004, v. 18, n. 7-9, p. 549, doi. 10.1007/s10822-004-4071-5
- By:
- Publication type:
- Article
Adding the Reliability on Tree Based Topology Construction Algorithms for Wireless Sensor Networks.
- Published in:
- Wireless Personal Communications, 2014, v. 74, n. 2, p. 989, doi. 10.1007/s11277-013-1334-2
- By:
- Publication type:
- Article
Secure Computation Without Authentication.
- Published in:
- Journal of Cryptology, 2011, v. 24, n. 4, p. 720, doi. 10.1007/s00145-010-9075-9
- By:
- Publication type:
- Article
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries.
- Published in:
- Journal of Cryptology, 2010, v. 23, n. 3, p. 422, doi. 10.1007/s00145-008-9034-x
- By:
- Publication type:
- Article
NAPADI NA BEZBEDNOST BEžIčNIH LOKALNIH MREžA.
- Published in:
- InfoM, 2013, n. 47, p. 46
- By:
- Publication type:
- Article
Coalgebraic Weak Bisimulation for Action-Type Systems.
- Published in:
- Scientific Annals of Computer Science, 2009, v. 19, p. 93
- By:
- Publication type:
- Article
A CONSTRAINED SHORTEST ROUTE PROBLEM.
- Published in:
- Operations Research, 1968, v. 16, n. 1, p. 205, doi. 10.1287/opre.16.1.205
- By:
- Publication type:
- Article
P2P resource searching with Cloning Random Walker assisted by Weakly Connected Dominating Set.
- Published in:
- Journal of Supercomputing, 2014, v. 68, n. 1, p. 443, doi. 10.1007/s11227-013-1046-0
- By:
- Publication type:
- Article
Connectivity and coverage maintenance in wireless sensor networks.
- Published in:
- Journal of Supercomputing, 2010, v. 52, n. 1, p. 23, doi. 10.1007/s11227-009-0268-7
- By:
- Publication type:
- Article
Solving survivable two-layer network design problems by metric inequalities.
- Published in:
- Computational Optimization & Applications, 2012, v. 51, n. 2, p. 809, doi. 10.1007/s10589-010-9364-0
- By:
- Publication type:
- Article
Large-Scale Active-Set Box-Constrained Optimization Method with Spectral Projected Gradients.
- Published in:
- Computational Optimization & Applications, 2002, v. 23, n. 1, p. 101, doi. 10.1023/A:1019928808826
- By:
- Publication type:
- Article