1.ASSESSMENT OF PEDAGOGIES
Source:4TH INTERNATIONAL TECHNOLOGY, EDUCATION AND DEVELOPMENT CONFERENCE (INTED 2010),2010,Vol.
2.Perturbation modelling of a corner deleted circular polarised microstrip antenna with offset feed
Source:2010 WRI International Conference on Communications and Mobile Computing, CMC 2010,2010,Vol.2
3.E-commerce systems for software agents: Challenges and opportunities
Source:E-Business Issues, Challenges and Opportunities for SMEs: Driving Competitiveness,2010,Vol.
4.A Novel Set-Based Particle Swarm Optimization Method for Discrete Optimization Problems
Source:IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION,2010,Vol.14
5.Equivalent Extensions to Caristi-Kirk's Fixed Point Theorem, Ekeland's Variational Principle, and Takahashi's Minimization Theorem
Source:FIXED POINT THEORY AND APPLICATIONS,2010,Vol.2010
6.Statistical analysis and structure optimization of large photovoltaic module
Source:2010 5th International Conference on Future Information Technology, FutureTech 2010 - Proceedings,2010,Vol.
7.Do Knowledge Characteristics Matter?A Test of the Relationship Between Knowledge Characteristics and Performance
Source:SAM advanced management journal: AMJ,2010,Vol.
8.Structural signature and contact force distributions in the simulated three-dimensional sphere packs subjected to uniaxial compression
Source:SCIENCE CHINA-PHYSICS MECHANICS & ASTRONOMY,2010,Vol.53
9.Multi-camera video surveillance for real-time analysis and reconstruction of soccer games
Source:MACHINE VISION AND APPLICATIONS,2010,Vol.21
10.Building wireless sensor network applications with LooCI
Source:International Journal of Mobile Computing and Multimedia Communications,2010,Vol.2
11.Decentralized fault detection and management for Wireless Sensor Networks
Source:2010 5th International Conference on Future Information Technology, FutureTech 2010 - Proceedings,2010,Vol.
12.Applying a multi-paradigm approach to implementing wireless sensor network based river monitoring
Source:Proceedings - 2010 1st ACIS International Symposium on Cryptography, and Network Security, Data Mining and Knowledge Discovery, E-Commerce and Its Applications, and Embedded Systems, CDEE 2010,2010,Vol.
13.IDENTIFYING BUSINESS-TO-BUSINESS CRITICAL SUCCESS FACTORS (B2B CSFS): CHINESE SMES' PERSPECTIVE
Source:PROCEEDINGS OF ACADEMY OF INNOVATION AND ENTREPRENEURSHIP 2010,2010,Vol.
14.Sliding-Window Raptor Codes for Efficient Scalable Wireless Video Broadcasting With Unequal Loss Protection
Source:IEEE TRANSACTIONS ON IMAGE PROCESSING,2010,Vol.19
15.We Needs a Significant Reform: Indigenous Research on Chinese Leadership as Example
Source:JOURNAL OF XI'AN JIAOTONG UNIVERSITY(SOCIAL SCIENCES),2010,Vol.30
16.Working towards efficient parallel computing of integral images on multi-core processors
Source:ICCET 2010 - 2010 International Conference on Computer Engineering and Technology, Proceedings,2010,Vol.2
17.Classification of Subcellular Phenotype Images by Decision Templates for Classifier Ensemble
Source:2009 INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL MODELS FOR LIFE SCIENCES (CMLS '09),2010,Vol.1210
18.Middleware for resource sharing in multi-purpose wireless sensor networks
Source:2010 IEEE International Conference on Networked Embedded Systems for Enterprise Applications, NESEA 2010,2010,Vol.
19.A probabilistic framework for automated mechanism design
Source:Proceedings of 2010 IEEE International Conference on Service Operations and Logistics, and Informatics, SOLI 2010,2010,Vol.
20.Substructure preconditioners for a class of structured linear systems of equations
Source:MATHEMATICAL AND COMPUTER MODELLING,2010,Vol.52