Personensuche
X
?
Communications in Computer and Information Science; Artificial Life and Evolutionary Computation ,
1
scFBApy: A Python Framework for Super-Network Flux Balance ..:
, In:
?
Communications in Computer and Information Science; Artificial Life and Evolutionary Computation ,
2
An Efficient Implementation of Flux Variability Analysis fo..:
, In:
?
2023 31st Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP) ,
3
Coupling constrained-based flux sampling and clustering to ..:
, In:
?
Machine Learning, Optimization, and Data Science; Lecture Notes in Computer Science ,
4
Best Practices in Flux Sampling of Constrained-Based Models:
, In:
?
Computational Intelligence Methods for Bioinformatics and Biostatistics; Lecture Notes in Computer Science ,
5
Global Sensitivity Analysis of Constraint-Based Metabolic M..:
, In:
?
Computational Intelligence Methods for Bioinformatics and Biostatistics; Lecture Notes in Computer Science ,
6
Integration of Single-Cell RNA-Sequencing Data into Flux Ba..:
, In:
?
Communications in Computer and Information Science; Artificial Life and Evolutionary Computation ,
7
Synchronization Effects in a Metabolism-Driven Model of Mul..:
, In:
?
Developments in Language Theory; Lecture Notes in Computer Science ,
8
Modeling Spatio-Temporal Dynamics of Metabolic Networks wit..:
, In:
?
Artificial Intelligence in Medicine; Lecture Notes in Computer Science ,
9
An Interactive Dashboard for Patient Monitoring and Managem..:
, In:
?
Internet of Things; IoT Edge Solutions for Cognitive Buildings ,
10
Aggregate Programming for Customized Building Management an..:
, In:
?
Proceedings of the 5th ACM International Workshop on Verification and mOnitoring at Runtime EXecution ,
11
RM for users' safety and security in the built environment:
, In:
?
Proceedings of the 13th International Conference on Management of Digital EcoSystems ,
12
Dynamic and Scalable Enforcement of Access Control Policies..:
, In:
?
Model-driven Simulation and Training Environments for Cybersecurity; Lecture Notes in Computer Science ,
13
Towards the Monitoring and Evaluation of Trainees' Activiti..:
, In:
?
Computer Security; Lecture Notes in Computer Science ,
14
A Model Driven Approach for Cyber Security Scenarios Deploy..:
, In:
?
Business Information Systems Workshops; Lecture Notes in Business Information Processing ,
15