Fuzzy Models and Methods of Rational Resource Allocation
暂无分享,去创建一个
Vitalii Lytvynov | Igor Skiter | Ivan Ganchev | Krassimira Ivanova | Krassimir Markov | Nina Khairova | Dmytro Progonov | Volodymyr Kazymyr | Olga Prila | Mykola Kryshchenko | Stefan Karastanev | Yuriy Zaychenko | Oleksiy Voychenko | Maxim Saveliev | Borys Rybalov | Larysa Savyuk | Vira Huskova | Galina Gayvoronska | Olexii Voloshyn | Vasyl Laver | Dmytro Melnychenko | Stepan Kovalev | Nazar Mykhailiv | Nataliya Sharonova | Ajit Pratap Singh Gautam | Сергей Л. Крывый | Ivan Ivanov | Mariyana Dimitrova | Valentyn Nekhai | Еlena Trunova | T. M. Kosovskaya | N. K. Kosovskii | Mikhail R. Starchak
[1] Jessica J. Fridrich,et al. Random Projections of Residuals for Digital Image Steganalysis , 2013, IEEE Transactions on Information Forensics and Security.
[2] Horngren Datar Rajan,et al. 3RD EDITION , 2008 .
[3] Ian T. Foster,et al. Virtual Workspaces in the Grid , 2005, Euro-Par.
[4] H. Simon,et al. Administrative Behavior: A Study of Decision-Making Processes in Administrative Organization. , 1959 .
[5] Rajkumar Buyya,et al. GridSim: a toolkit for the modeling and simulation of distributed resource management and scheduling for Grid computing , 2002, Concurr. Comput. Pract. Exp..
[6] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[7] Mark J. Huiskes,et al. The MIR flickr retrieval evaluation , 2008, MIR '08.
[8] M. S. Santhanam,et al. Digital Watermarking in the Singular Vector Domain , 2008, Int. J. Image Graph..
[9] Еліяшів Олег Миронович,et al. Дослідження властивостей нелінійного елемента передавача хаотичної системи зв’язку , 2011 .
[10] Kevin P. Murphy,et al. Machine learning - a probabilistic perspective , 2012, Adaptive computation and machine learning series.
[11] Charles L. A. Clarke,et al. Efficient construction of large test collections , 1998, SIGIR '98.
[12] Fernando De Maio,et al. Income inequality measures , 2007 .
[13] O Voloshyn,et al. GENERALIZATION OF DISTRIBUTING METHODS FOR FUZZY PROBLEMS , 2013 .
[14] В. И. Егоров,et al. Волоконно-оптические сети на основе метода квантовой коммуникации на боковых частотах , 2018 .
[15] Tomás Pevný,et al. Steganalysis by Subtractive Pixel Adjacency Matrix , 2009, IEEE Transactions on Information Forensics and Security.
[16] Barry O'Neill,et al. A problem of rights arbitration from the Talmud , 1982, Math. Soc. Sci..
[17] Alfredo Milani,et al. International Journal INFORMATION TECHNOLOGIES & KNOWLEDGE , 2009 .
[18] Hervé Moulin,et al. Axiomatic cost and surplus sharing , 2002 .
[19] E. M. Hartwell. Boston , 1906 .
[20] Matthew C. Stamm,et al. Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security , 2017, IH&MMSec.
[21] Сергей Витальевич Новиков,et al. Подход к построению защищенных распределенных сетей обработки данных на основе доверенной инфраструктуры , 2015 .
[22] Shahriar B. Shokouhi,et al. Improved Robust DWT-Watermarking in YCbCr Color Space , 2012, ArXiv.
[23] H. Young,et al. Distributive justice in taxation , 1988 .
[24] Tomás Pevný,et al. Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.
[25] Suresh N. Mali,et al. Secured color image watermarking technique in DWT-DCT domain , 2011, ArXiv.
[26] Andrew Moore,et al. The long sentence: A disservice to science in the Internet age , 2011 .
[27] Anumol Joseph,et al. Robust watermarking based on DWT SVD , 2013, ArXiv.
[28] Dmytro Progonov,et al. PASSIVE STEGANALYSIS OF MULTIDOMAIN EMBEDDING METHODS , 2015 .
[29] R. Aumann,et al. Game theoretic analysis of a bankruptcy problem from the Talmud , 1985 .
[30] L. Savyuk,et al. PODCASTS: A BRIDGE FROM E-LEARNING TO M-LEARNING , 2015 .
[31] B. Matthews. Comparison of the predicted and observed secondary structure of T4 phage lysozyme. , 1975, Biochimica et biophysica acta.
[32] William Thomson,et al. Axiomatic and game-theoretic analysis of bankruptcy and taxation problems: An update , 2015, Math. Soc. Sci..
[33] Агафонов Евгений Дмитриевич,et al. О проблеме выделения информативных признаков в задаче классификации текстовых документов , 2013 .
[34] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[35] J. K. Ward. Integrated computer-aided engineering , 1987 .
[36] A. Nagoor Gani,et al. A New Operation on Triangular Fuzzy Number for Solving Fuzzy Linear Programming Problem , 2012 .
[37] Nilanjan Dey,et al. A Novel Approach of Color Image Hiding using RGB Color planes and DWT , 2012, ArXiv.
[38] S. D. Kat︠s︡nelʹson. Типология языка и речевое мышление , 2004 .