Chapter RDF
pages:- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- more...
- Metrological Analysis of the DIC Ultimate Error Regime
- Mettre à portée d’apprentis la méthode de résolution par éléments finis : "Alignement pédagogique, évaluation par les pairs, classe inversée, analyse d’enseignement"
- Michael Porter. Une réflexion croisée entre stratégie et technologies de l'information et de la communication
- Microcellular Foaming of (Nano)Biocomposites by Continuous Extrusion Assisted by Supercritical CO2
- Microstructure and Mechanical Properties of Hybrid LPBF-DED Inconel 625
- Mining Classification Rules without Support: an Anti-monotone Property of Jaccard Measure
- Mining Configurable Process Fragments for Business Process Design
- Mining Event Logs to Assist the Development of Executable Process Variants
- Mining Frequent Closed Flows Based on Approximate Support with a Sliding Window over Packet Streams
- Mining Interesting Rules Without Support Requirement: A General Universal Existential Upward Closure Property
- Mining Top-k Frequent/Regular Patterns Based on User-Given Trade-Off between Frequency and Regularity
- MIRAGE: A Management Tool for the Analysis and Deployment of Network Security Policies
- MISE 3.0: An Agile Support for Collaborative Situation
- Mixed mode energy release rates for composite joints
- Mixed Variable Structural Optimization: Toward an Efficient Hybrid Algorithm
- ML: DDoS Damage Control with MPLS
- Mobile Social Commerce
- Mobile Social Commerce
- Mobile ‘Pseudonymous Strangers’
- Mobilisation des valeurs dans le processus de conception
- Mobilité dans Wi-Fi0-IEEE 802.11 r
- Model Transformation from CBM to EPL Rules to Detect Failure Symptoms
- Model-Based Image Interpretation under Uncertainty and Fuzziness
- Model-Driven Elasticity for Cloud Resources
- Model-Driven Extraction and Analysis of Network Security Policies
- Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems
- Modeling a Landing Gear System in Event-B
- Modeling and Managing Communities of Web Service Registries
- Modeling and Testing of Web-Based Systems
- Modeling and testing secure web applications