نتایج جستجو برای: ten

تعداد نتایج: 110313  

Journal: :Circulation Research 2009

Journal: :Journal of Database Marketing & Customer Strategy Management 2003

Journal: :The Biblical World 1903

Journal: :Poznańskie Studia Polonistyczne. Seria Literacka 2013

Journal: :Journal of Pediatric Neurosciences 2016

2009
Amy Verdun

This paper seeks to review a selection of ten salient critical claims about Economic and Monetary Union (EMU) that were heard in the 1990s in either the Political Science literature or the Economics literature or both. In this paper, the author focuses on five salient Political Science claims and five Economics claims prominent at the time that pointed to problems with EMU that could undermine ...

1999
Jacob K. Goeree Charles A. Holt

This paper reports data for a series of two-person games that are played only once. These games span the standard categories: static and dynamic games with complete and incomplete information. For each game, the treasure is a treatment for which behavior conforms quite nicely to the predictions of the Nash equilibrium or relevant refinement. In each case we change a key payoff parameter in a ma...

1990
Deepinder P. Sidhu

The User Requirements Notation (URN), standardized by the International Telecommunication Union in 2008, is used to model and analyze requirements with goals and scenarios. This paper describes the first ten years of development of URN, and discusses ongoing efforts targeting the next ten years. We did a study inspired by the systematic literature review approach, querying five major search eng...

2006
W. B. Langdon

Submachine code genetic programming and multiple classification GP runs are used to winow the predictive inputs and then evolve an entry to the WCCI-2007 binary time series prediction task held at the Congress on Evolutionary Computation (CEC-2006) held in Vancouver.

2010
Matt Bishop

Ten years ago, computer security was an arcane discipline that many academics did not see as an interesting or deep research area. Today, that perception has changed. Information assurance and computer security touch every aspect of our lives, and the interconnections with more traditional academic disciplines such as analysis of algorithms, operating systems, and network protocols have convinc...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید