Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Occupation time")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 880

  • Page / 36
Export

Selection :

  • and

Electronic restoration : Eliminating the ravages of time on historical mapsDIAZ, German; SEED, Patricia.Lecture notes in computer science. 2005, pp 100-108, issn 0302-9743, isbn 3-540-30850-4, 1Vol, 9 p.Conference Paper

Formalized metatheory with terms represented by an indexed family of typesADAMS, Robin.Lecture notes in computer science. 2006, pp 1-16, issn 0302-9743, isbn 3-540-31428-8, 1Vol, 16 p.Conference Paper

Fluctuation limits of site-dependent branching systems in critical and large dimensionsYUQIANG LI.Statistics & probability letters. 2011, Vol 81, Num 11, pp 1604-1611, issn 0167-7152, 8 p.Article

The packing indices for some Levy processesJING ZHENG; ZHENGYAN LIN; CHANGQING TONG et al.Statistics & probability letters. 2011, Vol 81, Num 11, pp 1683-1689, issn 0167-7152, 7 p.Article

Aligning and segmenting signatures at their crucial points through DTWQUAN, Zhong-Hua; JI, Hong-Wei.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-28226-2, 2Vol, part I, 49-58Conference Paper

Using feedback cycle for developing an adjustable security design metricSHIM, Charlie Y; KIM, Jung Y; SHIN, Sung Y et al.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-28312-9, 2Vol, Part II, 1158-1161Conference Paper

As time goes by: Using time series based decision tree induction to analyze the behaviour of opponent playersDRÜCKER, Christian; HÜBNER, Sebastian; VISSER, Ubbo et al.Lecture notes in computer science. 2002, pp 325-330, issn 0302-9743, isbn 3-540-43912-9, 6 p.Conference Paper

Pulse sequence studies on PD dataSENTHIL KUMAR, S; NARAYANACHAR, M. N; NEMA, R. S et al.CEIDP : conference on electrical insulation and dielectric phenomena. 2002, pp 724-727, isbn 0-7803-7502-5, 4 p.Conference Paper

A quantum cipher with near optimal key-recyclingDAMGARD, Ivan; PEDERSEN, Thomas Brochmann; SALVAIL, Louis et al.Lecture notes in computer science. 2005, pp 494-510, issn 0302-9743, isbn 3-540-28114-2, 1Vol, 17 p.Conference Paper

Fast modular multiplication by operand changingSCHIMMLER, Manfred; BUNIMOV, Viktor.International conference on information technology. 2004, pp vol2.518-524, isbn 0-7695-2108-8, 2VolConference Paper

Synchronous Broadcast Messaging : The Use of ICTWEISZ, Justin D; ERICKSON, Thomas; KELLOGG, Wendy A et al.CHI Conference. 2006, pp 1293-1302, isbn 1-59593-178-3, 10 p.Conference Paper

A hard real-time kernel for motorola microcontrollersMUMOLO, Enzo; NOLICH, Massimiliano; NOSER, Massimo Oss et al.CIT. Journal of computing and information technology. 2001, Vol 9, Num 3, pp 247-252, issn 1330-1136Article

Randomized online algorithms for maximizing busy time interval schedulingFAIGLE, U; GARBE, R; KERN, W et al.Computing (Wien. Print). 1996, Vol 56, Num 2, pp 95-104, issn 0010-485XArticle

The favorite point of a poisson processKHOSHNEVISAN, D; LEWIS, T. M.Stochastic processes and their applications. 1995, Vol 57, Num 1, pp 19-38, issn 0304-4149Article

End-to-end delay of an adaptive selective repeat ARQ protocolJIN-FU CHANG; TZU-HUI YANG.IEEE transactions on communications. 1994, Vol 42, Num 11, pp 2926-2928, issn 0090-6778Article

Dynamic bin packing of unit fractions itemsCHAN, Wun-Tat; LAM, Tak-Wah; WONG, Prudence W. H et al.Lecture notes in computer science. 2005, pp 614-626, issn 0302-9743, isbn 3-540-27580-0, 13 p.Conference Paper

Computing the envelope for stepwise-constant resource allocationsMUSCETTOLA, Nicola.Lecture notes in computer science. 2002, pp 139-154, issn 0302-9743, isbn 3-540-44120-4, 16 p.Conference Paper

Information Security Policy Concerns as Case Law Shifts toward Balance between Employer Security and Employee PrivacyJUNGCK, Kathleen; RAHMAN, M.Security & management. International conferenceWorldComp'2011. 2011, pp 605-609, isbn 1-60132-196-1 1-60132-197-X 1-60132-198-8, 5 p.Conference Paper

Applying flow-sensitive CQUAL to verify MINIX authorization check placementFRASER, Timothy; PETRONI, Nick L; ARBAUGH, William A et al.Programming Languages and Analysis for Security Workshop. 2006, pp 3-6, isbn 1-595-93374-3, 1Vol, 4 p.Conference Paper

A timed-release key management scheme for backward recoveryYOSHIDA, Maki; MITSUNARI, Shigeo; FUJIWARA, Toru et al.Lecture notes in computer science. 2006, pp 3-14, issn 0302-9743, isbn 3-540-33354-1, 1Vol, 12 p.Conference Paper

Path Loss Rate Driven Burst Assembly in OBS NetworksKANTARCI, Burak; OKTUG, Sema.Lecture notes in computer science. 2006, pp 483-492, issn 0302-9743, isbn 3-540-47242-8, 1Vol, 10 p.Conference Paper

Comparison of point selection for characterizing on-line signatureWIROTIUS, M; RAMEL, J. Y; VINCENT, N et al.SPIE proceedings series. 2005, pp 307-313, isbn 0-8194-5764-7, 7 p.Conference Paper

A Methodology to Characterize Kernel Level Rootkit Exploits that Overwrite the System Call TableLEVINE, John G; GRIZZARD, Julian B; HUTTO, Phillip W et al.IEEE Southeastcon. 2004, pp 25-31, isbn 0-7803-8367-2, 1Vol, 7 p.Conference Paper

QoS routing in hypercube multicomputersJIE WU; FEI DAI.Parallel processing letters. 2003, Vol 13, Num 1, pp 43-52, issn 0129-6264, 10 p.Article

An adaptive method for dynamic audience size estimation in multicastNEKOVEE, Maziar; SOPPERA, Andrea; BURBRIDGE, Trevor et al.Lecture notes in computer science. 2003, pp 23-33, issn 0302-9743, isbn 3-540-20051-7, 11 p.Conference Paper

  • Page / 36