formal models, languages and applica...
|
|
formal models, languages and applications
|
fighting terror in cyberspace
|
|
fighting terror in cyberspace
|
computational intelligence in softwa...
|
|
computational intelligence in software quality assurance
|
personalization techniques and recom...
|
|
personalization techniques and recommender systems
|
graph classification and clustering ...
|
|
graph classification and clustering based on vector space embedding /
|
bridging the gap between graph edit ...
|
|
bridging the gap between graph edit distance and kernel machines
|
image pattern recognition
|
|
image pattern recognition
|
data mining with decision trees
|
|
data mining with decision trees
|
wavelet theory and its application t...
|
|
wavelet theory and its application to pattern recognition
|
fundamentals of robotics :
|
|
fundamentals of robotics :
|
|
hybrid metaheuristics :
|
dissimilarity representation for pat...
|
|
dissimilarity representation for pattern recognition
|
kernels for structured data
|
|
kernels for structured data
|
wavelet theory and its application t...
|
|
wavelet theory and its application to pattern recognition
|
introduction to pattern recognition
|
|
introduction to pattern recognition
|
recognition of whiteboard notes
|
|
recognition of whiteboard notes
|
computational intelligence in softwa...
|
|
computational intelligence in software quality assurance /
|
fighting terror in cyberspace /
|
|
fighting terror in cyberspace /
|
introduction to pattern recognition
|
|
introduction to pattern recognition
|