Search results for: James Malcolm
Journal of Evolutionary Biology > 32 > 8 > 868 - 877
Lecture Notes in Computer Science > Security Protocols > 256-256
Lecture Notes in Computer Science
Lecture Notes in Computer Science > Security Protocols > 299-305
Lecture Notes in Computer Science > Security Protocols > 217-220
Lecture Notes in Computer Science > Medical Image Computing and Computer-Assisted Intervention – MICCAI 2008 > Statistical Analysis > 416-424
Lecture Notes in Computer Science > Combinatorial Image Analysis > Image Representation, Segmentation, Grouping, and Reconstruction > 185-196
Lecture Notes in Computer Science > Medical Image Computing and Computer-Assisted Intervention – MICCAI 2010 > Diffusion Tensor MR Imaging and Analysis > 657-665
Lecture Notes in Computer Science > Security Protocols > 315-321
NeuroImage > 2011 > 56 > 1 > 220-234
Reinforced Plastics > 2009 > 53 > 7 > 42-44
2007 IEEE International Conference on Image Processing > 4 > IV - 365 - IV - 368
Linear Algebra and Its Applications > 2007 > 425 > 2-3 > 663-672