Search Results

There are 35247 results for: content related to: The bit-economy: An artificial model of open-ended technology discovery

  1. You have free access to this content
    On seeing the trees and the forest: Single-signal and multisignal analysis of periictal intracranial EEG


    Volume 53, Issue 9, September 2012, Pages: 1658–1668, Kaspar Schindler, Heidemarie Gast, Marc Goodfellow and Christian Rummel

    Article first published online : 10 JUL 2012, DOI: 10.1111/j.1528-1167.2012.03588.x

  2. Mining interesting sequential patterns for intelligent systems

    International Journal of Intelligent Systems

    Volume 20, Issue 1, January 2005, Pages: 73–87, Show-Jane Yen

    Article first published online : 1 DEC 2004, DOI: 10.1002/int.20054

  3. Hard-to-Solve Bimatrix Games


    Volume 74, Issue 2, March 2006, Pages: 397–429, Rahul Savani and Bernhard von Stengel

    Article first published online : 21 FEB 2006, DOI: 10.1111/j.1468-0262.2006.00667.x

  4. Implementing belief function computations

    International Journal of Intelligent Systems

    Volume 18, Issue 1, January 2003, Pages: 31–49, Rolf Haenni and Norbert Lehmann

    Article first published online : 3 JAN 2003, DOI: 10.1002/int.10073

  5. The impact of bitwise operators on hash uniformity in network packet processing

    International Journal of Communication Systems

    Volume 27, Issue 11, November 2014, Pages: 3158–3184, Bing Xiong, Kun Yang, Feng Li, Xiaosu Chen, Jianming Zhang, Qiang Tang and Yuansheng Luo

    Article first published online : 3 APR 2013, DOI: 10.1002/dac.2532

  6. OpenCL performance portability for general-purpose computation on graphics processor units: an exploration on cryptographic primitives

    Concurrency and Computation: Practice and Experience

    Volume 27, Issue 14, 25 September 2015, Pages: 3633–3660, Giovanni Agosta, Alessandro Barenghi, Alessandro Di Federico and Gerardo Pelosi

    Article first published online : 29 AUG 2014, DOI: 10.1002/cpe.3358

  7. A signature file scheme based on multiple organizations for indexing very large text databases

    Journal of the American Society for Information Science

    Volume 41, Issue 7, October 1990, Pages: 508–534, A. Kent, R. Sacks-Davis and K. Ramamohanarao

    Article first published online : 7 JAN 1999, DOI: 10.1002/(SICI)1097-4571(199010)41:7<508::AID-ASI5>3.0.CO;2-J

  8. Analysis of the information theoretically secret key agreement by public discussion

    Security and Communication Networks

    Volume 8, Issue 15, October 2015, Pages: 2507–2523, Qiuhua Wang, Xiaojun Wang, Qiuyun Lv, Xueyi Ye, Yi Luo and Lin You

    Article first published online : 23 JAN 2015, DOI: 10.1002/sec.1192

  9. Modelling linguistic taxonomic dynamics

    Transactions of the Philological Society

    Volume 105, Issue 2, July 2007, Pages: 126–147, Søren Wichmann, Dietrich Stauer, F. Wellington S. Lima and Christian Schulze

    Article first published online : 29 JUN 2007, DOI: 10.1111/j.1467-968X.2007.00184.x


    Journal of the Experimental Analysis of Behavior

    Volume 94, Issue 2, September 2010, Pages: 241–260, J. J. McDowell and Andrei Popa

    Article first published online : 26 FEB 2013, DOI: 10.1901/jeab.2010.94-241

  11. A public-key based authentication and key establishment protocol coupled with a client puzzle

    Journal of the American Society for Information Science and Technology

    Volume 54, Issue 9, July 2003, Pages: 810–823, M.C. Lee and Chun-Kan Fung

    Article first published online : 7 MAY 2003, DOI: 10.1002/asi.10253

  12. S

    Molecular Descriptors for Chemoinformatics: Volume I: Alphabetical Listing / Volume II: Appendices, References, Volume 41

    Roberto Todeschini, Viviana Consonni, Pages: 659–798, 2010

    Published Online : 12 FEB 2010, DOI: 10.1002/9783527628766.ch19

  13. Multiupdate mode quantum evolutionary algorithm and its applications to combination and permutation problems

    IEEJ Transactions on Electrical and Electronic Engineering

    Volume 7, Issue 2, March 2012, Pages: 166–173, Xin Wei and Shigeru Fujimura

    Article first published online : 4 JAN 2012, DOI: 10.1002/tee.21712

  14. Numerical simulation of percussive drilling

    International Journal for Numerical and Analytical Methods in Geomechanics

    Volume 39, Issue 8, 10 June 2015, Pages: 889–912, Alexandre Depouhon, Vincent Denoël and Emmanuel Detournay

    Article first published online : 8 JAN 2015, DOI: 10.1002/nag.2344

  15. Analysis of the Effect of Dataset Differences on Object Recognition: The Case of Recognition Methods Based on Exact Matching of Feature Vectors

    Electronics and Communications in Japan

    Volume 96, Issue 9, September 2013, Pages: 33–45, Katsufumi Inoue and Koichi Kise

    Article first published online : 6 AUG 2013, DOI: 10.1002/ecj.11414

  16. Similarity searching

    Wiley Interdisciplinary Reviews: Computational Molecular Science

    Volume 1, Issue 2, March/April 2011, Pages: 260–282, Dagmar Stumpfe and Jürgen Bajorath

    Article first published online : 18 FEB 2011, DOI: 10.1002/wcms.23

  17. Creating a Network of Trust Using X.509 Certificates

    Implementing SSL/TLS Using Cryptography and PKI

    Joshua Davies, Pages: 221–296, 2011

    Published Online : 3 NOV 2011, DOI: 10.1002/9781118255797.ch5

  18. Similarity Searching in Databases of Chemical Structures

    Reviews in Computational Chemistry, Volume 7

    Geoffrey M. Downs, Peter Willett, Pages: 1–66, 2007

    Published Online : 5 JAN 2007, DOI: 10.1002/9780470125847.ch1

  19. Production of Ideas by Means of Ideas: A Turing Machine Metaphor


    Volume 55, Issue 2-3, May 2004, Pages: 155–179, Stefano Zambelli

    Article first published online : 25 MAY 2004, DOI: 10.1111/j.0026-1386.2004.00188.x

  20. Descriptor-Based Similarity Measures for Screening Chemical Databases

    Virtual Screening for Bioactive Molecules

    John M. Barnard, Geoffrey M. Downs, Peter Willett, Pages: 59–80, 2008

    Published Online : 4 MAR 2008, DOI: 10.1002/9783527613083.ch4