by
Bossomaier, Terry. author.
Format:
Electronic Resources
Excerpt:
information theory and transfer entropy in depth. A key feature of the approach is the authors' work to show
by
Eppstein, David. author.
Format:
Electronic Resources
Excerpt:
differs from some other neighbor state or states by just one of those feature. A simple example of a
View Other Search Results
by
Steffen, Bernhard. author.
Format:
Electronic Resources
Excerpt:
compositionality as a feature that not only acts as a foundation for algebraic proofs but also as a key for more
by
Olague, Gustavo. author.
Format:
Electronic Resources
Excerpt:
Synthesis of Feature Descriptor Operators with Genetic Programming -- Summary and Conclusions -- App. A
by
Russo, Alessandra. editor. (orcid)0000-0002-3318-8711
Format:
Electronic Resources
Excerpt:
: Efficient Non-Commutativity Analysis of Feature-Based Systems -- Taming Multi-Variability of Software
by
Vinh, Phan Cong. editor.
Format:
Electronic Resources
Excerpt:
Answering Method -- FRFE: Fast Recursive Feature Elimination for Credit Scoring -- Joint Load Balancing and
by
Rosen, Alon. author.
Format:
Electronic Resources
Excerpt:
security (i.e., of the zero-knowledge feature) when many - stances are executed concurrently, and in
by
Bjørner, Dines. editor.
Format:
Electronic Resources
Excerpt:
unique feature, the book closes with short commentaries on the specification languages written by
by
Ibaraki, Toshihide. editor.
Format:
Electronic Resources
Excerpt:
Constructive Genetic Approach to Point-Feature Cartographic Label Placement -- Papers on Methodologies
by
Hofkirchner, Wolfgang.
Format:
Electronic Resources
Excerpt:
will provide the reader with a deep insight into a basic feature of our world.
by
Siarry, Patrick. editor.
Format:
Electronic Resources
Excerpt:
-- “MOSS-II” Tabu/Scatter Search for Nonlinear Multiobjective Optimization -- Feature Selection for
by
Maher, Michael J. editor.
Format:
Electronic Resources
Excerpt:
Framework for Resource Aware Distributed Computing -- The Feature Selection and Intrusion Detection Problems
Limit Search Results
Narrowed by: