iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ instances
جزئیات خدمات ترجمه در ترجمه تخصصی
e−
مقاله تخصصی کامپیوتر
Amazon Web Services - Architecting for The Cloud: Best Practices January 2010
Amazon Web Services - Architecting for The Cloud: Best Practices January 2010
Expert Systems with Applications 39 (2012) 8947–8953
7.5. A critical analysis of the instance indicators
Available online at www.sciencedirect.com
Computers & Operations Research 39 (2012) 1506–1520
IEEE INFOCOM 2014 - IEEE Conference on Computer Communications
EUROPEAN
European Journal of Operational Research 240 (2015) 637–648
Contents
32 2SupervisedLearning
Data Mining
ISSN (Online) : 2278-1021
Available online at www.sciencedirect.com
Ensemble classifier for mining data streams Abstract The problem addressed
1)Researcher Bypasses Google Password Alert For Second Time A security researcher has developed a method–actually two methods–for defeating the new Chrome Password Alert extension that Google released earlier this week.
A Hybrid Approach for Searching in the Semantic Web
ARTICLE IN PRESS
Alignment-based Trust for Resource Finding
European Journal of Operational Research 236 (2014) 800–810
Alignment-based Trust for Resource Finding
COMPUSOFT, An international journal of advanced computer technology, 3 (9), September-2014 (Volume-III, Issue-IX)
COMPUSOFT, An international journal of advanced computer technology, 3 (9), September-2014 (Volume-III, Issue-IX)
Using polynomial reductions to test the suitability of metaheuristics for
We have considered the problem of job scheduling on a
We have considered the problem of job scheduling on a
Using polynomial reductions to test the suitability of metaheuristics for
We have considered the problem of job scheduling on a
In Pr o c e e dings ML tgo Ed San Mate o CA Mor gan Kaufmann
Carnegie Mellon University
AppliedMathematicsand Computation263 (2015) 287–301
This article was downloaded by: [University of Montana]
MappingXMLtoOWLOntologies
Data Min Knowl Disc (2014) 28:265–303
European Journal of Operational Research 257 (2017) 1–12
EuropeanJournal ofOperational Research245 (2015) 645–655
EuropeanJournal ofOperational Research245 (2015) 645–655
European Journal of Operational Research 257 (2017) 1–12
ON AND A
ON AND A
cut algorithm for the strong minimum energy topology in wireless
Towards Optimal Capacity Segmentation
6.2 Heuristic solution methods for the workforce assignment problem 149
Recent Advances in Clustering: A Brief Survey
is given where the vertex set I is made of
Swarm and Evolutionary Computation 15 (2014) 80–94
Greece a r t i c l e i n
Greece a r t i c l e i n
Greece a r t i c l e i n
Active Learning Literature Survey
Introduction This report provides a general review of the literature
Active Learning Literature Survey
Computers & Operations Research 78 (2017) 117–128
ARTICLE IN PRESS
AUCTION SHILL DETECTION FRAMEWORK BASED ON SVM
AUCTION SHILL DETECTION FRAMEWORK BASED ON SVM
Classification for Fraud Detection with Social
General Approach A Paxos node can take on any or
General Approach A Paxos node can take on any or
Orange Visual Programming Documentation, Release 3
Improving SIEM for Critical SCADA Water
Estimating the Predictive Accuracy of a Classifier 87
Math. Prog. Comp. (2012) 4:363–381
11. Availability: A heuristic for judging
11. Availability: A heuristic for judging
11. Availability: A heuristic for judging
11. Availability: A heuristic for judging
Proceedings of the 41st International Conference on Computers & Industrial Engineering