![]() | ![]() |
2005 | ||
---|---|---|
2 | EE | Nazli Goharian, Ling Ma, Chris Meyers: Detecting Misuse of Information Retrieval Systems Using Data Mining Techniques. ISI 2005: 604-605 |
1996 | ||
1 | Tom Eberle, Robert McVay, Chris Meyers, Jason Moore: ASIC BIST Synthesis: A VHDL Approach. ITC 1996: 741-750 |
1 | Tom Eberle | [1] |
2 | Nazli Goharian | [2] |
3 | Ling Ma | [2] |
4 | Robert McVay | [1] |
5 | Jason Moore | [1] |