From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Two Approaches for Answering Inadequate Queries-Empirical Project IDB-KROOM., , , и . FQAS, том 58 из Datalogiske Skrifter (Writings on Computer Science), стр. 127-146. Roskilde University, (1994)Towards a Practical Model-Driven Approach to Web Information System., и . iiWAS, том 196 из books@ocg.at, стр. 629-642. Austrian Computer Society, (2005)Convergence of self-organizing neural algorithms., и . Neural Networks, 5 (3): 485-493 (1992)Quantitative Risk Assessment of Computer Virus Attacks on Computer Networks., , и . Computer Networks and ISDN Systems, 27 (10): 1447-1456 (1995)Semiautomatic Implementation of Communication Protocols from a Petri Net Based Specification Language Description., , и . FORTE, стр. 25-29. North-Holland, (1989)Towards an Algebraic Theory of Inheritance in Project Oriented Programming., и . AMAST, стр. 349-358. Springer, (1993)XML Schema for Software Process Framework., , и . Applied Informatics, стр. 948-954. IASTED/ACTA Press, (2003)HBP: A Novel Technique for Dynamic Optimization of the Feed-Forward Neural Network Configuration., , и . ICINCO (1), стр. 346-349. INSTICC Press, (2004)Distributed Symbolic-SubSymbolic Agent Architecture for Configuring Power Network Faults., и . ICMAS, стр. 451. The MIT Press, (1995)Prosumer recruitment framework for prosumer community groups in smart-grid., , , , и . Comput. Syst. Sci. Eng., (2013)