Chapter RDF
pages:- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- more...
- Customer/Supplier Relationship: reducing Uncertainties in Commercial Offers thanks to Readiness, Risk and Confidence Considerations
- Cyber-Physical Systems Engineering: An Introduction
- Cybernetics andSystemicity
- Damage tolerance of composite structures under low-velocity impact
- Damage tolerance of composite structures under low-velocity impact
- Dances with despots: tourists and the afterlife of statues
- Data Quality Evaluation in Medical Database Watermarking
- Data Ranking and Clustering via Normalized Graph Cut Based on Asymmetric Affinity
- Data-Driven Evaluation of Intrusion Detectors: A Methodological Framework
- Database Consistency Models
- Database Consistency Models
- Databases Traceability by Means of Watermarking with Optimized Detection
- DD-DIC: A Parallel Finite Element Based Digital Image Correlation Solver
- De la "transformation digitale" au "new normal" : une reconfiguration des modes de travail
- Deadlock-Freeness Verification of Business Process Configuration Using SOG
- Decentralized Modular Approach for Fault Diagnosis of a Class of Hybrid Dynamic Systems: Application to a Multicellular Converter
- Deep Active Learning with Simulated Rationales for Text Classification
- Delamination analysis during drilling of composite material carbon-epoxy
- Demo Abstract: MakeSense—Managing Reproducible WSNs Experiments
- Deployment of an IoT Solution for Early Behavior Change Detection
- Descripteurs visuels dans le standard MPEG-7
- Descriptive Profiles for Sets of Alternatives in Multiple Criteria Decision Aid
- Design of a Secure Shield for Internet and Web-Based Services Using Software Reflection
- Design of a Shared-Memory Model for CAPE
- Design of a Smart Continence Management System Based on Initial User Requirement Assessment
- Designing Mobility: Pervasiveness as the Enchanting Tool of Mobility
- Designing Safe and Secure Embedded and Cyber-Physical Systems with SysML-Sec
- Designing Valid Humanitarian Logistics Scenario Sets
- Designing Valid Humanitarian Logistics Scenario Sets
- Detecting Control Flow in Smarphones: Combining Static and Dynamic Analyses