Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Function evaluation")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 228

  • Page / 10
Export

Selection :

  • and

The realization and function evaluation of the LCAS technology in MSTP systemMIAO CAO; LIANG FENG; JIE ZHANG et al.Proceedings of SPIE, the International Society for Optical Engineering. 2005, pp 60222X.1-60222X.7, issn 0277-786X, isbn 0-8194-6053-2, 2VolConference Paper

Algorithm 916: Computing the Faddeyeva and Voigt FunctionsZAGHLOUL, Mofreh R; ALI, Ahmed N.ACM transactions on mathematical software. 2012, Vol 38, Num 2, issn 0098-3500, 15.1-15.22Article

The development of a security systems research and test laboratory at a universitySMITH, Clifton L.International Carnahan Conference on Security Technology. 2004, pp 111-115, isbn 0-7803-8506-3, 1Vol, 5 p.Conference Paper

A refined evaluation function for the MinLA problemRODRIGUEZ-TELLO, Eduardo; HAO, Jin-Kao; TORRES-JIMENEZ, Jose et al.Lecture notes in computer science. 2006, pp 392-403, issn 0302-9743, isbn 3-540-49026-4, 1Vol, 12 p.Conference Paper

On the limitations of universally composable two-party computation without set-up assumptionsCANETTI, Ran; KUSHILEVITZ, Eyal; LINDELL, Yehuda et al.Lecture notes in computer science. 2003, pp 68-86, issn 0302-9743, isbn 3-540-14039-5, 19 p.Conference Paper

Towards the quality evaluation of functional aspects of operative Web applicationsABRAHAO, Silvia; OLSINA, Luis; PASTOR, Oscar et al.Lecture notes in computer science. 2003, pp 325-338, issn 0302-9743, isbn 3-540-20255-2, 14 p.Conference Paper

Unconditionally secure homomorphic pre-distributed bit commitment and secure two-party computationsNASCIMENTO, Anderson C. A; MUELLER-QUADE, Joern; OTSUKA, Akira et al.Lecture notes in computer science. 2003, pp 151-164, issn 0302-9743, isbn 3-540-20176-9, 14 p.Conference Paper

Automatic performance evaluation of web search engines using judgments of metasearch enginesSADEGHI, Hamid.Online information review (Print). 2011, Vol 35, Num 6, pp 957-971, issn 1468-4527, 15 p.Article

Evaluation of chess position by modular neural network generated by genetic algorithmAUTONES, Mathieu; BECK, Ariel; CAMACHO, Philippe et al.Lecture notes in computer science. 2004, pp 1-10, issn 0302-9743, isbn 3-540-21346-5, 10 p.Conference Paper

Highly accurate and efficient evaluation of randomising set index functionsVANDIERENDONCK, Hans; DE BOSSCHERE, Koen.Journal of systems architecture. 2003, Vol 48, Num 13-15, pp 429-452, issn 1383-7621, 24 p.Article

An improved simulated annealing algorithm for bandwidth minimizationRODRIGUEZ-TELLO, Eduardo; HAO, Jin-Kao; TORRES-JIMENEZ, Jose et al.European journal of operational research. 2008, Vol 185, Num 3, pp 1319-1335, issn 0377-2217, 17 p.Conference Paper

Hardware operators for function evaluation using sparse-coefficient polynomialsBRISEBARRE, N; MULLER, J.-M; TISSERAND, A et al.Electronics Letters. 2006, Vol 42, Num 25, pp 1441-1442, issn 0013-5194, 2 p.Article

Evaluation of web sites for B2C e-commerceOPPENHEIM, Charles; WARD, Louise.Aslib proceedings : New information perspectives. 2006, Vol 58, Num 3, pp 237-260, 24 p.Article

Evaluation ponctuelle et espace de Hardy : le cas multi-échelle = Point evaluation and Hardy space: the multiscale caseALPAY, Daniel; DIJKSMA, Aad; VOLOK, Dan et al.Comptes rendus. Mathématique. 2005, Vol 340, Num 6, pp 416-420, issn 1631-073X, 5 p.Article

Non-uniform segmentation for hardware function evaluationLEE, Dong-U; LUK, Wayne; VILLASENO, John et al.Lecture notes in computer science. 2003, pp 796-807, issn 0302-9743, isbn 3-540-40822-3, 12 p.Conference Paper

Application of fuzzy theory to value engineeringNAGASAWA, S.Computers & industrial engineering. 1997, Vol 33, Num 3-4, pp 565-568, issn 0360-8352Conference Paper

Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert AdversariesHAZAY, Carmit; LINDELL, Yehuda.Journal of cryptology. 2010, Vol 23, Num 3, pp 422-456, issn 0933-2790, 35 p.Article

Generalized Embedded Landscape and Its Decomposed RepresentationSHUDE ZHOU; HECKENDORN, Robert B; ZENGQI SUN et al.Lecture notes in computer science. 2006, pp 9-17, issn 0302-9743, isbn 3-540-47331-9, 1Vol, 9 p.Conference Paper

Evaluation of functions, gradients, and jacobiansRALL, Louis B.Reliable computing. 2003, Vol 9, Num 2, pp 177-182, issn 1385-3139, 6 p.Conference Paper

Genetic programming for robot soccerCIESIELSKI, Vic; MAWHINNEY, Dylan; WILSON, Peter et al.Lecture notes in computer science. 2002, pp 319-324, issn 0302-9743, isbn 3-540-43912-9, 6 p.Conference Paper

From simple features to sophisticated evaluation functionsBURO, M.Lecture notes in computer science. 1999, pp 126-145, issn 0302-9743, isbn 3-540-65766-5Conference Paper

Table methods for the elementary functionsLEFEVRE, V; MULLER, J. M.SPIE proceedings series. 1999, pp 43-49, isbn 0-8194-3293-8Conference Paper

Function points analysis : An empirical study of its measurement processesABRAN, A; ROBILLARD, P. N.IEEE transactions on software engineering. 1996, Vol 22, Num 12, pp 895-910, issn 0098-5589Article

Efficient Set Operations in the Presence of Malicious AdversariesHAZAY, Carmit; NISSIM, Kobbi.Journal of cryptology. 2012, Vol 25, Num 3, pp 383-433, issn 0933-2790, 51 p.Article

Quality assessment of academic libraries' performance with a special reference to information technology-based services: Suggesting an evaluation checklistBABALHAVAEJI, Fahimeh; ISFANDYARI-MOGHADDAM, Alireza; SEYED VAHID AQILI et al.Electronic library. 2010, Vol 28, Num 4, pp 592-621, issn 0264-0473, 30 p.Article

  • Page / 10