Search
Selected: W

Weak subsumption Constraints for Type Diagnosis: An Incremental Algorithm

Computer Science – Computation and Language
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Weak ties: Subtle role of information diffusion in online social networks

Computer Science – Social and Information Networks
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Weak Typed Boehm Theorem on IMLL

Computer Science – Logic in Computer Science
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Weak vs. Self vs. Probabilistic Stabilization

Computer Science – Distributed – Parallel – and Cluster Computing
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Weak-light phase locking for LISA

Computer Science – Performance
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Weakening Assumptions for Deterministic Subexponential Time Non-Singular Matrix Completion

Computer Science – Computational Complexity
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Weakest Preconditions and Cumulative Subgoal Fulfillment: A Comparison

Computer Science – Software Engineering
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Weakly damped Alfven waves as drivers of solar chromospheric spicules

Computer Science
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Weakly interacting massive particles, solar neutrinos, and solar oscillations

Computer Science
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Weakly magnetic crust in the Canadian Cordillera

Computer Science
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Weakly Supervised Learning of Foreground-Background Segmentation using Masked RBMs

Computer Science – Learning
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Weakness Analysis and Improvement of a Gateway-Oriented Password-Based Authenticated Key Exchange Protocol

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Weakness in a Mutual Authentication Scheme for Session Initiation Protocol using Elliptic Curve Cryptography

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Weaknesses of a dynamic identity based authentication protocol for multi-server architecture

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Wearable Exo-Skeletal Robot Skil Mate and its Application to EVA Suits

Computer Science – Robotics
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Weather on Other Worlds: A Survey of Cloud-Induced Variability in Brown Dwarfs

Computer Science
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Weather Radar

Computer Science
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Weathering features and secondary minerals in Antarctic Shergottites ALHA77005 and LEW88516

Computer Science
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Weathering in Terrestrial Samples from the Miller Range and Elephant Moraine Regions of Antarctica: Comparisons with Weathering in Antarctic Martian Meteorites

Computer Science
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Weathering of Basaltic Rocks from the Gusev Plains up into the Columbia Hills from the Perspective of the MER Mössbauer Spectrometer

Computer Science
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.