861 resultados para Skype, crittografia, sicurezza, intercettazioni, peer-to-peer.
Resumo:
J. Keppens and Q. Shen. Granularity and disaggregation in compositional modelling with applications to ecological systems. Applied Intelligence, 25(3):269-292, 2006.
Resumo:
I. Miguel and Q. Shen. Exhibiting the behaviour of time-delayed systems via an extension to qualitative simulation. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, 35(2):298-305, 2005.
Resumo:
J. Keppens, Q. Shen and M. Lee. Compositional Bayesian modelling and its application to decision support in crime investigation. Proceedings of the 19th International Workshop on Qualitative Reasoning, pages 138-148.
Resumo:
K. Rasmani and Q. Shen. Subsethood-based Fuzzy Rule Models and their Application to Student Performance Classification. Proceedings of the 14th International Conference on Fuzzy Systems, pages 755-760, 2005.
Resumo:
M. Galea, Q. Shen and J. Levine. Evolutionary approaches to fuzzy modelling. Knowledge Engineering Review, 19(1):27-59, 2004.
Resumo:
Urquhart, C. (2007). Information literacy and what we tend, conveniently, to forget. LfN Bulletin, 27(2/3), 9-20.
Resumo:
Price, T., Urquhart, C. & Cooper, J. (2007). Using a prompt sheet to improve the reference interview in a health telephone helpline service. Evidence Based Library and Information Practice, 2(3), 43-58 Open access journal
Resumo:
L. Blot and R. Zwiggelaar, 'A volumetric approach to risk assessment in mammography: a feasibility study', Physics in Medicine and Biology 50 (4), 695-708 (2005)
Resumo:
L. Blot, A. Davis, M. Holubinka, R. Marti and R. Zwiggelaar, 'Automated quality assurance applied to mammographic imaging', EURASIP Journal of Applied Signal Processing 2002 (7), 736-745 (2002)
Resumo:
B.M. Brown, M. Marletta, S. Naboko, I. Wood: Boundary triplets and M-functions for non-selfadjoint operators, with applications to elliptic PDEs and block operator matrices, J. London Math. Soc., June 2008; 77: 700-718. The full text of this article will be made available in this repository in June 2009 Sponsorship: EPSRC,INTAS
Resumo:
B.M. Brown, M.S.P. Eastham, I. Wood: Conditions for the spectrum associated with a leaky wire to contain the interval [? ?2/4, ?), Arch. Math., 90, 6 (2008), 554-558
Resumo:
Whelan, K. E. and King, R. D. Using a logical model to predict the growth of yeast. BMC Bioinformatics 2008, 9:97
Resumo:
Eckerdal, A., McCartney, R., Mostr?m, J. E., Sanders, K., Thomas, L., and Zander, C. 2007. From Limen to Lumen: computing students in liminal spaces. In Proceedings of the Third international Workshop on Computing Education Research (Atlanta, Georgia, USA, September 15 - 16, 2007). ICER '07. ACM, New York, NY, 123-132.
Resumo:
Mead, J., Gray, S., Hamer, J., James, R., Sorva, J., Clair, C. S., and Thomas, L. 2006. A cognitive approach to identifying measurable milestones for programming skill acquisition. SIGCSE Bull. 38, 4 (Dec. 2006), 182-194.
Resumo:
Fitzgerald, S., Simon, B., and Thomas, L. 2005. Strategies that students use to trace code: an analysis based in grounded theory. In Proceedings of the First international Workshop on Computing Education Research (Seattle, WA, USA, October 01 - 02, 2005). ICER '05. ACM, New York, NY, 69-80