Chapter RDF
pages:- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- more...
- An Event-Based Packet Dropping Detection Scheme for Wireless Mesh Networks
- An Exact Smoother in a Fuzzy Jump Markov Switching Model
- An Extended Role-Based Access Control Model for Delegating Obligations
- An Industry-Adapted AR Training Method for Manual Assembly Operations
- An Intelligent Decision Support System Inspired by Newton’s Laws of Motion
- An Interactive Smart Mirror Using Internet of Things and Machine Learning
- An introduction to contextualizing human memory
- An n-Sided Polygonal Model to Calculate the Impact of Cyber Security Events
- An Ontology Based Collaborative Business Service Selection - Contributing to Automatic Building of Collaborative Business Process
- An Ontology-Based Context-Aware Infrastructure for Smart Homes
- An Ontology-Based P2P Network for Semantic Search
- An Ontology-Based P2P Network for Semantic Search
- An Open-Source Tool-Chain for Performance Analysis
- An Overview of Recent Advances in Monte-Carlo Methods for Bayesian Filtering in High-Dimensional Spaces
- Analog and Digitized Radio-over-Fiber
- Analyse de marché
- Analysis of a Collaborative Resilient Solution Based on Real-Time Re-Optimization for Home Health Care Routes Subject to Disruptions by Discrete Event Simulation
- Analysis of Coherence-Collapse Regime of Semiconductor Lasers Under External Optical Feedback by Perturbation Method
- Analysis of Electrical Phenomena Occurring in Thermally Assisted Mechanical Dewatering Processes (TAMD)-a Preliminary Study
- Analysis of GSM HSCSD Service with Channel Allocation Constraints
- Analysis of Performance and Energy Consumption in the Cloud
- Analysis of QUIC Session Establishment and Its Implementations
- Analysis of the Impact of Interaction Patterns and IoT Protocols on Energy Consumption of IoT Consumer Applications
- Analyzing Feasibility for Deploying Very Fast Decision Tree for DDoS Attack Detection in Cloud-Assisted WBAN
- Analyzing Hospital Sterilization Service Vulnerabilities Using a Risk-Aware Business Process Modeling Method
- Analyzing Internet DNS(SEC) Traffic with R for Resolving Platform Optimization
- Anchoring research in the field: threading beads together
- Animating a Conversational Agent with User Expressivity
- Anomaly Ranking in a High Dimensional Space: The Unsupervised TreeRank Algorithm
- Anonymous Certification for an e-Assessment Framework