González, R., Sánchez, L., Vallepuga, J.: Desarrollo de un entorno en C++ y OpenGL para la resolucion de problemas de contacto entre solidos 3D. In: Actas del congreso Metodos numericos en Ingenieria (2009) 6.
Currently, the platform is enhanced with additional functions and plugins such as competence matrix, student portfolios and a custom knowledge base plugin ... Busch, C.: Logistics Competencies, Skills and Training: A Global Overview.
Proposal. for. Applying. Soft. Computing. Techniques. for. Dialog. Management. Figure 1 summarizes the five main tasks usually integrated in ... This information also includes confidence scores generated by the ASR and SLU modules [7].
In: 2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST), Morioka, Japan, pp. 1–6. IEEE (2019) 7. Sheng, K., Liu, Z., Zhou, D., He, A., Feng, C.: Research on ship classification based on trajectory ...
10th International Conference on Soft Computing Models in Industrial and Environmental Applications. Advances in Intelligent Systems and Computing, vol. 368, pp. 475–483. Springer International Publishing, Switzerland (2015) 8.
Cremers, C., Mauw, S.: Operational Semantics and Verification of Security Protocols. Information Security and Cryptography series. Springer, Heidelberg (2012) 7. David, A., Larsen, K.G., et al.: UPPAAL SMC tutorial. Int. J. Softw.
In: Proceedings of the 2nd Workshop on Methods and Cases in Computing Education (2009) 10. ... In: Baker, E., Dickieson, J., Wulfeck, W., O'Neil, H. (eds.) ... International workshop on evidence-based technology enhanced learning.
This book constitutes the refereed proceedings of the 4th International Conference on Computational Intelligence in Security for Information Systems, CISIS 2011, held in Torremolinos-Málaga, in June 2011 as a satellite event of IWANN 2011, ...
... Stream Cipher Project, Call for Primitives, http://www.ecrypt ... RC4 Stream Cipher and Its Variants. Discrete Mathematics and Its Applications. CRC Press, Taylor & Francis Group, Boca Raton (2012) 16. Rueppel, R.A.: Analysis and Design of ...
... Emergent Web Intelligence: Advanced Information Retrieval, pp. 169–198. Springer, London (2010) 11. Salton, G., Buckley, C.: Term-weighting approaches in automatic text retrieval. Information Processing and Management 24(5), 513–523 ...
... security of IBM i system additional research should be made. Using proposed metrics other two system layers should ... 1. Engelsman, W.: Information Assets and their Value. Univ. of Twente (2007) 2. Brinkley, D.L., Schell, R.R.: Concepts ...
... 3D virtual museum exhibitions with Flex-VR. In: The 18th International ... Worlds with a Physical Metaphor. IEEE Pervasive Computing 8(3), 50–54 (2009) ... Security. Informatica 33(1), 3–24 (2009) 7. Wójtowicz, A.: Secure User-Contributed ...