Katalog
requested module/action is not exists
No. Katalog | Katalog | Subjek | Actions |
---|---|---|---|
143115 results (page 8198/14312) | |||
R.537 |
IEEE/ACM Transactions on Computational Biology and Bioinformatics: Vol. 10, No. 1, January-February 2013 tersedia 1 koleksi total 1 koleksi |
COMPUTATIONAL BIOLOGY AND BIOINFORMATICS
1. Editorial from the New Editor-in-Chief / Ying Xu
2. RNA Secondary Structure Prediction Using Soft Computing / Shubhra Sankar Ray, Sankar K. Pal
3. A Simple Fixed parameter tractable Algorithm..selengkapnya..
|
|
R.5640 |
IEEE/ACM Transactions on Computational Biology and Bioinformatics: Vol. 10, No. 5, September-October 2013 tersedia 1 koleksi total 1 koleksi |
COMPUTATIONAL BIOLOGY AND BIOINFORMATICS
1. Guest Editor for ACM BCB / T. Kahveci, M. Singh
2. Nonoverlapping Clone Pooling for High-Throughput Sequencing / R. M. Kuroshu
3. Improved Multiple Sequence Alignments Using Coupled Pattern Mining /..selengkapnya..
|
|
R.6327 |
IEEE/ACM Transactions on Computational Biology and Bioinformatics: Vol. 10, No. 2, March-April 2013 tersedia 2 koleksi total 2 koleksi |
COMPUTATIONAL BIOLOGY AND BIOINFORMATICS
1. Guest Editorial : Advanced Algorithms of Bioinformatics / Yi-Ping Phoebe Chen
2. Chain-RNA : A Comparative ncRNA Search Tool Based on the Two-Dimensional Chain Algorithm / Jikai Lei, Prapaporn techa-angkoon,..selengkapnya..
|
|
R.8356 |
IEEE/ACM Transactions on Computational Biology and Bioinformatics: Vol. 10, No. 3, May-June 2013 tersedia 2 koleksi total 2 koleksi |
COMPUTATIONAL BIOLOGY AND BIOINFORMATICS
1. A Recent Survey on Colon Cancer Detection Techniques / Saima Rathore, Mutawarra Hussain, Ahmad Ali, Asifullah Khan
2. A Combination of Feature Extraction Methods With an Ensemble of Different..selengkapnya..
|
|
R.8429 |
IEEE/ACM Transactions on Computational Biology and Bioinformatics: Vol. 10, No. 4, July-August 2013 tersedia 1 koleksi total 1 koleksi |
COMPUTATIONAL BIOLOGY AND BIOINFORMATICS
1. Guest Editorial for Special Section on BSB 2012 - Marcilio C.P. de Souto and Maricel Kann / M. C. P. de Souto, M. Kann
2. Extending the Algebraic Formalism for..selengkapnya..
|
|
14.44.4372 |
IEEE Transactions Information Forensics And Security : Vol. 9, No. 7 - 8, July - August 2014 tersedia 1 koleksi total 1 koleksi |
FORENSIC COMPUTER
Information Forensic and Security
1. A Dynamic matching algorithm for audio timestamp identification using the ENF criterion.
2. On recognizing faces in videos using clustering-based re-ranking and fusion.
3. On a mathematical model for low-rate shrew..selengkapnya..
|
|
15.44.257 |
IEEE Transactions Information Forensics And Security : Vol. 8, No. 3-4, March-April 2013 tersedia 1 koleksi total 1 koleksi |
FORENSIC COMPUTER
Information Forensic and Security
1. Unreconciled Collicions Uncover Cloning Attacks in Anonymous RFFID Systems / Kai Bu, et al.
2. Increasing Security Degree of Freedom in Multiuser and Multieve Systems / Kun Xie, Wen Chen,..selengkapnya..
|
|
15.44.258 |
IEEE Transactions Information Forensics And Security: Vol. 8, No. 9-10, September-October 2013 tersedia 1 koleksi total 1 koleksi |
FORENSIC COMPUTER
Information Forensic and Security
1. "Seeing" ENNF: power-signature-based timestamp for digital multimedia via optical sensing and signal processing / Ravi Garg, et al.
2. Analysis of Reusability of Secure Sketches and Fuzzy Extractors / Marina..selengkapnya..
|
|
15.44.259 |
IEEE Transactions Information Forensics And Security : Vol. 8, No. 1 - 2, January - February 2013 tersedia 2 koleksi total 2 koleksi |
FORENSIC COMPUTER
Information Forensic and Security
1. Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions / Jun Zhang, et al.
2. User Authentication Through Mouse Dynamics / Chao Shen, et al.
3. Latent Fingerprint Matching Using Descriptor-Based..selengkapnya..
|
|
15.44.260 |
IEEE Transactions Information Forensics And Security :Vol. 8, No. 7-8, July-August 2013 tersedia 1 koleksi total 1 koleksi |
FORENSIC COMPUTER
Information Forensic and Security
1. Uncoordinated Cooperative Jamming for Secret Communications / Shuangyu Luo, Jiangyuan Li, Athina P. Petropulu
2. A Novel Reversible Data Hiding Scheme Based on Two-Dimensional Difference-Histogram Modification / Xiaolong Li, et..selengkapnya..
|
|