Entity usage

From MaRDI portal

This page lists pages that use the given entity (e.g. Q42). The list is sorted by descending page ID, so that newer pages are listed first.

List of pages that use a given entity

Showing below up to 50 results in range #1 to #50.

View (previous 50 | ) (20 | 50 | 100 | 250 | 500)

  1. The supervised learning Gaussian mixture model: Label: en
  2. A neural network model based on logical operations: Label: en
  3. Research on the optimal parallel algorithms of broadcast-class problems: Label: en
  4. Center-distance continuous probability models and the distance measure: Label: en
  5. Element-partition-based methods for visualization of 3D unstructured grid data: Label: en
  6. A new definition of the Hough transform: Label: en
  7. The comparison between the statistical heuristic search and \(A^*\): Label: en
  8. An optimized divide-and-conquer algorithm for the closest-pair problem in the planar case: Label: en
  9. A complete critical path algorithm for test generation of combinational circuits: Label: en
  10. Lazy slicing for state-space exploration: Label: en
  11. Standard-cell placement from functional descriptions: Label: en
  12. Hyperspectral imagery denoising using a spatial-spectral domain mixing prior: Label: en
  13. Design of quaternary ECL Q gate: Label: en
  14. A geometric approach for multi-degree spline: Label: en
  15. Pricing loss leaders can be hard: Label: en
  16. Worst-case Nash equilibria in restricted routing: Label: en
  17. Envy-free pricing with general supply constraints for unit demand consumers: Label: en
  18. On isomorphism testing of groups with normal Hall subgroups: Label: en
  19. A quadratic lower bound for three-query linear locally decodable codes over any field: Label: en
  20. Satisfiability with index dependency: Label: en
  21. Preface to the special issue on theoretical computer science: Label: en
  22. Community-aware resource profiling for personalized search in folksonomy: Label: en
  23. Community detection in dynamic social networks based on multiobjective immune algorithm: Label: en
  24. Convex decomposition based cluster labeling method for support vector clustering: Label: en
  25. Fuzzy distance-based range queries over uncertain moving objects: Label: en
  26. A dimensionality reduction framework for detection of multiscale structure in heterogeneous networks: Label: en
  27. Delay and capacity trade-offs in mobile wireless networks with infrastructure support: Label: en
  28. Checkpoint management with double modular redundancy based on the probability of task completion: Label: en
  29. Modeling a dynamic data replication strategy to increase system availability in cloud computing environments: Label: en
  30. Related axis: the extension to XPath towards effective XML search: Label: en
  31. Optimal checkpoint placement on real-time tasks with harmonic periods: Label: en
  32. Construction of the model of the lambda calculus system with algebraic operators: Label: en
  33. Publishing set-valued data against realistic adversaries: Label: en
  34. Dynamic uncertain causality graph for knowledge representation and reasoning: discrete DAG cases: Label: en
  35. Harmonizing melody with meta-structure of piano accompaniment figure: Label: en
  36. Structure-based deadlock checking of asynchronous circuits: Label: en
  37. Formal verification of temporal properties for reduced overhead in grid scientific workflows: Label: en
  38. Free appearance-editing with improved Poisson image cloning: Label: en
  39. Multiview visibility estimation for image-based modeling: Label: en
  40. Minimum-time aggregation scheduling in duty-cycled wireless sensor networks: Label: en
  41. An efficient method for cleaning dirty-events over uncertain data in WSNs: Label: en
  42. Nondeterministic probabilistic Petri net -- a new method to study qualitative and quantitative behaviors of system: Label: en
  43. Towards a formal semantics for UML/MARTE state machines based on hierarchical timed automata: Label: en
  44. A secure scalar product protocol against malicious adversaries: Label: en
  45. A new batch verifying scheme for identifying illegal signatures: Label: en
  46. Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD: Label: en
  47. Resources snapshot model for concurrent transactions in multi-core processors: Label: en
  48. Some indices of alphabet overlap graph: Label: en
  49. Parameterized computation and complexity: a new approach dealing with NP-hardness: Label: en
  50. Random walk routing in WSNS with regular topologies: Label: en

View (previous 50 | ) (20 | 50 | 100 | 250 | 500)