Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Deorowicz, Sebastian
and
Grabowski, Szymon
2009.
Man-Machine Interactions.
Vol. 59,
Issue. ,
p.
541.
Belazzougui, Djamal
2009.
Combinatorial Pattern Matching.
Vol. 5577,
Issue. ,
p.
154.
Nazeem, Ahmed
and
Reveliotis, Spyros
2011.
A Practical Approach for Maximally Permissive Liveness-Enforcing Supervision of Complex Resource Allocation Systems.
IEEE Transactions on Automation Science and Engineering,
Vol. 8,
Issue. 4,
p.
766.
Ting-wei Chen
Madrazo, Carlos
Tsuchiya, Takeshi
and
Koyanagi, Keiichi
2011.
Unbalanced replication by evaluating popularity over web scalable storage.
p.
189.
Gilar, Martin
Fridrich, Jessica
Schure, Mark R.
and
Jaworski, Aleksander
2012.
Comparison of Orthogonality Estimation Methods for the Two-Dimensional Separations of Peptides.
Analytical Chemistry,
Vol. 84,
Issue. 20,
p.
8722.
Canca, David
Zarzo, Alejandro
González‐R, Pedro L.
Barrena, Eva
and
Algaba, Encarnación
2013.
A methodology for schedule‐based paths recommendation in multimodal public transportation networks.
Journal of Advanced Transportation,
Vol. 47,
Issue. 3,
p.
319.
Reveliotis, Spyros
and
Nazeem, Ahmed
2014.
Formal Methods in Manufacturing.
Vol. 20144163,
Issue. ,
p.
169.
Fei, Zhennan
Akesson, Knut
and
Reveliotis, Spyros
2014.
Symbolic computation and representation of deadlock avoidance policies for complex resource allocation systems with application to multithreaded software.
p.
5935.
Reveliotis, Spyros
2015.
Coordinating Autonomy: Sequential Resource Allocation Systems for Automation.
IEEE Robotics & Automation Magazine,
Vol. 22,
Issue. 2,
p.
77.
de Paula Marques, Mateus
and
Abrão, Taufik
2015.
Subcarrier and Power Allocation Algorithm for Spectral Efficiency Maximization in Superposition Coding OFDMA Systems.
Journal of Circuits, Systems and Computers,
Vol. 24,
Issue. 05,
p.
1550061.
Winterrose, Michael L.
Carter, Kevin M.
Wagner, Neal
and
Streilein, William W.
2016.
Balancing Security and Performance for Agility in Dynamic Threat Environments.
p.
607.
Li, Jiandong
and
Huang, Runhe
2016.
Enhanced KStore with the use of dictionary and Trie for retail business data.
p.
1.
Niquefa, Rafael
Mendivelso, Juan
Hernández, Germán
and
Pinzón, Yoan
2017.
Applied Computer Sciences in Engineering.
Vol. 742,
Issue. ,
p.
131.
Gao, Meng
Xiang, Longgang
and
Gong, Jianya
2017.
Organizing large-scale trajectories with adaptive Geohash-tree based on secondo database.
p.
1.
Scheidl, Harald
Fiel, Stefan
and
Sablatnig, Robert
2018.
Word Beam Search: A Connectionist Temporal Classification Decoding Algorithm.
p.
253.
Yang, Bin
and
Wang, Guan
2018.
PTA Scoring Analysis Based on Statistical Method in a MOOC.
p.
545.
Janabia, Dahlia Al-
and
Letia, Tiberiu S.
2018.
The Development of Complex Data Structures Using Object Enhanced Time Petri Nets.
p.
709.
Kwon, Dongseop
Kim, Sun
Wei, Chih-Hsuan
Leaman, Robert
and
Lu, Zhiyong
2018.
ezTag: tagging biomedical concepts via interactive learning.
Nucleic Acids Research,
Vol. 46,
Issue. W1,
p.
W523.
Khadiev, Kamil
and
Ilikaev, Artem
2019.
Theory and Practice of Natural Computing.
Vol. 11934,
Issue. ,
p.
234.
Wang, Rui
Artho, Cyrille
Kristensen, Lars Michael
and
Stolz, Volker
2019.
Integrated Formal Methods.
Vol. 11918,
Issue. ,
p.
474.