Search Results

There are 1710 results for: content related to: The Value of Wildcard Options

  1. Improving children's performance on photographic line-ups: Do the physical properties of a ‘wildcard’ make a difference?

    Legal and Criminological Psychology

    Volume 21, Issue 2, September 2016, Pages: 358–371, Rachel Zajac and Fiona Jack

    Version of Record online : 19 JAN 2015, DOI: 10.1111/lcrp.12075

  2. Exploring the effects of age and delay on children's person identifications: Verbal descriptions, lineup performance, and the influence of wildcards

    British Journal of Psychology

    Volume 102, Issue 2, May 2011, Pages: 161–183, Aspasia Karageorge and Rachel Zajac

    Version of Record online : 11 MAR 2011, DOI: 10.1348/000712610X507902

  3. Enabling hierarchical dissemination of streams in content distribution networks

    Concurrency and Computation: Practice and Experience

    Volume 24, Issue 14, 25 September 2012, Pages: 1594–1606, Shrideep Pallickara and Geoffrey Fox

    Version of Record online : 14 DEC 2011, DOI: 10.1002/cpe.1909

  4. You have free access to this content
    Efficient and secure multi-functional searchable symmetric encryption schemes

    Security and Communication Networks

    Volume 9, Issue 1, 10 January 2016, Pages: 34–42, Changhui Hu, Lidong Han and Siu Ming Yiu

    Version of Record online : 22 OCT 2015, DOI: 10.1002/sec.1376

  5. You have free access to this content
    Protein Analysis Meets Visual Word Recognition: A Case for String Kernels in the Brain

    Cognitive Science

    Volume 36, Issue 4, May/June 2012, Pages: 575–606, Thomas Hannagan and Jonathan Grainger

    Version of Record online : 20 MAR 2012, DOI: 10.1111/j.1551-6709.2012.01236.x

  6. Formal passive testing of timed systems: theory and tools

    Software Testing, Verification and Reliability

    Volume 22, Issue 6, September 2012, Pages: 365–405, César Andrés, Mercedes G. Merayo and Manuel Núñez

    Version of Record online : 15 FEB 2012, DOI: 10.1002/stvr.1464

  7. A ciphertext-policy hidden vector encryption scheme supporting multiuser keyword search

    Security and Communication Networks

    Volume 8, Issue 6, April 2015, Pages: 879–887, Liao Zhenhua, Wang Jinmiao and Lang Bo

    Version of Record online : 22 JUN 2014, DOI: 10.1002/sec.1044

  8. GENCHECK: A program for consistency checking and derivation of genotypes at co-dominant and dominant loci

    Journal of Animal Breeding and Genetics

    Volume 119, Issue 5, October 2002, Pages: 350–360, J. Bennewitz, N. Reinsch and E. Kalm

    Version of Record online : 16 OCT 2002, DOI: 10.1046/j.1439-0388.2002.00357.x

  9. Meteor: a middleware infrastructure for content-based decoupled interactions in pervasive grid environments

    Concurrency and Computation: Practice and Experience

    Volume 20, Issue 12, 25 August 2008, Pages: 1455–1484, Nanyan Jiang, Andres Quiroz, Cristina Schmidt and Manish Parashar

    Version of Record online : 15 NOV 2007, DOI: 10.1002/cpe.1278

  10. Byonic: Advanced Peptide and Protein Identification Software


    Current Protocols in Bioinformatics


    Marshall Bern, Yong J. Kil and Christopher Becker

    Published Online : 1 DEC 2012, DOI: 10.1002/0471250953.bi1320s40

  11. Character-based symmetric searchable encryption and its implementation and experiment on mobile devices

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1717–1725, Takanori Suga, Takashi Nishide and Kouichi Sakurai

    Version of Record online : 12 SEP 2013, DOI: 10.1002/sec.876

  12. Language evolution and the spread of ideas on the Web: A procedure for identifying emergent hybrid word family members

    Journal of the American Society for Information Science and Technology

    Volume 57, Issue 10, August 2006, Pages: 1326–1337, Mike Thelwall and Liz Price

    Version of Record online : 6 JUN 2006, DOI: 10.1002/asi.20437

  13. You have free access to this content
    Exploratory information searching in the enterprise: A study of user satisfaction and task performance

    Journal of the Association for Information Science and Technology

    Volume 68, Issue 1, January 2017, Pages: 77–96, Paul H. Cleverley, Simon Burnett and Laura Muir

    Version of Record online : 23 SEP 2015, DOI: 10.1002/asi.23595

  14. CloudEyes: Cloud-based malware detection with reversible sketch for resource-constrained internet of things (IoT) devices

    Software: Practice and Experience

    Volume 47, Issue 3, March 2017, Pages: 421–441, Hao Sun, Xiaofeng Wang, Rajkumar Buyya and Jinshu Su

    Version of Record online : 23 JUN 2016, DOI: 10.1002/spe.2420

  15. Global interrelationships of Plesiosauria (Reptilia, Sauropterygia) and the pivotal role of taxon sampling in determining the outcome of phylogenetic analyses

    Biological Reviews

    Volume 85, Issue 2, May 2010, Pages: 361–392, Hilary F. Ketchum and Roger B. J. Benson

    Version of Record online : 9 DEC 2009, DOI: 10.1111/j.1469-185X.2009.00107.x

  16. The Mystery Man Can Help Reduce False Identification for Child Witnesses: Evidence from Video Line-ups

    Applied Cognitive Psychology

    Volume 27, Issue 1, January/February 2013, Pages: 50–59, Catriona Havard and Amina Memon

    Version of Record online : 13 SEP 2012, DOI: 10.1002/acp.2870

  17. Dynamic control plane management for software-defined networks

    International Journal of Network Management

    Volume 26, Issue 2, March/April 2016, Pages: 111–130, Jian Li, Jae-Hyoung Yoo and James Won-Ki Hong

    Version of Record online : 22 FEB 2016, DOI: 10.1002/nem.1924

  18. Ghost marker detection and elimination in marker-based optical tracking systems for real-time tracking in stereotactic body radiotherapy

    Medical Physics

    Volume 41, Issue 10, October 2014, Guanghua Yan, Jonathan Li, Yin Huang, Kathryn Mittauer, Bo Lu and Chihray Liu

    Version of Record online : 30 NOV 2016, DOI: 10.1118/1.4896126

  19. Hardware-accelerated protein identification for mass spectrometry

    Rapid Communications in Mass Spectrometry

    Volume 19, Issue 6, 30 March 2005, Pages: 833–837, Anish T. Alex, Michel Dumontier, Jonathan S. Rose and Christopher W. V. Hogue

    Version of Record online : 18 FEB 2005, DOI: 10.1002/rcm.1853

  20. Palaeomorphology: fossils and the inference of cladistic relationships

    Acta Zoologica

    Volume 91, Issue 1, January 2010, Pages: 72–80, Gregory D. Edgecombe

    Version of Record online : 20 DEC 2009, DOI: 10.1111/j.1463-6395.2009.00426.x