Conference paper
Soft x-ray diffraction of striated muscle
S.F. Fan, W.B. Yun, et al.
Proceedings of SPIE 1989
Knowledge-based techniques have much to offer security practitioners. After brief overviews of these techniques, we review applications described in the literature and suggest others. Applications in other domains that offer insights for security are also described. Requirements for knowledge system tools are discussed in the light of the suggested applications. © 1988.
S.F. Fan, W.B. Yun, et al.
Proceedings of SPIE 1989
Reena Elangovan, Shubham Jain, et al.
ACM TODAES
Heinz Koeppl, Marc Hafner, et al.
BMC Bioinformatics
Ohad Shamir, Sivan Sabato, et al.
Theoretical Computer Science