kw.\*:("Control información")
Results 1 to 25 of 469
Selection :
Ancora sulla censuraREVELLI, Carlo.Biblioteche oggi. 2013, Vol 31, Num 5, pp 62-65, issn 0392-8586, 4 p.Article
Simple, robust and highly concurrent B-trees with node deletionLOMET, David.International Conference on data engineering. 2004, pp 18-28, isbn 0-7695-2065-0, 1Vol, 11 p.Conference Paper
Share based measures for itemsetsCARTER, C. L; HAMILTON, H. J; CERCONE, N et al.Lecture notes in computer science. 1997, pp 14-24, issn 0302-9743, isbn 3-540-63223-9Conference Paper
Crisis IT design implications for high risk systems: systems, control and information propositionsMCKINNEY, Earl H.Behaviour & information technology (Print). 2011, Vol 30, Num 3, pp 339-352, issn 0144-929X, 14 p.Article
A display table for strategic collaboration preserving private and public informationKITAMURA, Yoshifumi; OSAWA, Wataru; YAMAGUCHI, Tokuo et al.Lecture notes in computer science. 2005, pp 167-179, issn 0302-9743, isbn 3-540-29034-6, 13 p.Conference Paper
Information structures to control formation splitting and mergingEREN, Tolga; ANDERSON, Brian D. O; MORSE, A. Stephen et al.American Control Conference. 2004, pp 4951-4956, isbn 0-7803-8335-4, 6 p.Conference Paper
Emergent societies of information agentsDAVIDSSON, P.Lecture notes in computer science. 2000, pp 143-153, issn 0302-9743, isbn 3-540-67703-8Conference Paper
REGIONAL DIFFERENCES IN COLLECTING FREETHOUGHT BOOKS IN AMERICAN PUBLIC LIBRARIES: A CASE OF SELF-CENSORSHIP?'SLOAN, Stephen.The Library quarterly (Chicago, IL). 2012, Vol 82, Num 2, pp 183-205, issn 0024-2519, 23 p.Article
Three-dimensional context-aware tailoring of informationGRONLI, Tor-Morten; GHINEA, George.Online information review (Print). 2010, Vol 34, Num 6, pp 892-906, issn 1468-4527, 15 p.Article
Calculation of model of the robot by neural network with robot joint distinctionMOZARYN, J; KUREK, J. E.Lecture notes in computer science. 2004, pp 792-797, issn 0302-9743, isbn 3-540-22123-9, 6 p.Conference Paper
Future directions in control in an information-rich worldMURRAY, Richard M; ASTRÖM, Karl J; BOYD, Stephen P et al.IEEE control systems. 2003, Vol 23, Num 2, pp 20-33, issn 1066-033X, 14 p.Article
Comment dire sans le dire = How to tell without tellingLEGAVRE, Jean-Baptiste.Dossiers de l'audiovisuel (Bry-sur-Marne). 2002, Num 106, pp 48-50, issn 0767-4775, 3 p.Article
Save me, save them! Trash talk shows and the third-person effectGUERRERO-SOLE, Frederic; BESALU, Reinald; LOPEZ-GONZALEZ, Hibai et al.Communications (Sankt Augustin). 2014, Vol 39, Num 2, pp 193-214, issn 0341-2059, 22 p.Article
The nastiness of dataSEADLE, Michael.Library hi tech. 2009, Vol 27, Num 3, pp 333-337, issn 0737-8831, 5 p.Article
Supporting the conversational knowledge process in the networked communityNISHIDA, Toyoaki.Lecture notes in computer science. 2003, pp 138-157, issn 0302-9743, isbn 3-540-20111-4, 20 p.Conference Paper
Architectural requirements for rapid development of agile manufacturing systemsJUNG, M; MIN KEUN CHUNG; CHO, H et al.Computers & industrial engineering. 1996, Vol 31, Num 3-4, pp 551-554, issn 0360-8352Conference Paper
The Books Will Still Be in the Library: Narrow Definitions of Censorship in the Discourse of ChallengersKNOX, Emily.Library trends. 2014, Vol 62, Num 4, pp 740-749, issn 0024-2594, 10 p.Article
Stratton-Oakmont v. ProdigyROWE, H.Droit de l'informatique et des télécoms. 1996, Num 2, pp 61-62, issn 0991-2738Article
Maîtrise de l'information économique et désinformation = Disinformation and the control of economic informationBATTINI, R.Réalités industrielles. 1992, Num AVR, pp 78-79Article
MIFS-ND: A mutual information-based feature selection methodHOQUE, N; BHATTACHARYYA, D. K; KALITA, J. K et al.Expert systems with applications. 2014, Vol 41, Num 14, pp 6371-6385, issn 0957-4174, 15 p.Article
Security challenges in the distributed cloud computingNWOBODO, Ikechukwu; JAHANKHANI, Hossein; EDOH, Aloysius et al.International journal of electronic security and digital forensics (Print). 2014, Vol 6, Num 1, pp 38-51, issn 1751-911X, 14 p.Article
Information-Seeking Control Under Visibility-Based UncertaintyVALENTE, Luca; TSAI, Yen-Hsi R; SOATTO, Stefano et al.Journal of mathematical imaging and vision. 2014, Vol 48, Num 2, pp 339-358, issn 0924-9907, 20 p.Article
Beyond obscenity: an analysis of sexual discourse in LIS educational textsHILL, Heather; HARRINGTON, Marni.Journal of documentation. 2014, Vol 70, Num 1, pp 62-73, issn 0022-0418, 12 p.Article
A Quantitative Model and Analysis of Information Confusion in Social NetworksANAND, S; SUBBALAKSHMI, K. P; CHANDRAMOULI, R et al.IEEE transactions on multimedia. 2013, Vol 15, Num 1, pp 207-223, issn 1520-9210, 17 p.Article
Efficiently gathering information in costly domainsRECHES, Shulamit; GAL, Ya'akov; KRAUS, Sarit et al.Decision support systems. 2013, Vol 55, Num 1, pp 326-335, issn 0167-9236, 10 p.Article