Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functions computational » functions computation, function computation, directions computational
detection computational » section computational, prediction computational, interactions computational
programming solving » programming evolving, programming solutions, programming building
solving method » solving methods
method trust » methods trust, method test, method robust
functions computational » functions computation, function computation, directions computational
detection computational » section computational, prediction computational, interactions computational
programming solving » programming evolving, programming solutions, programming building
solving method » solving methods
method trust » methods trust, method test, method robust
1
Published 2007
Table of Contents:
“... and Consensus -- A Functional Programming System SFP: Sisal 3.1 Language Structures Decomposition -- Towards a...”View full text
Electronic
eBook
2
Published 2007
Table of Contents:
“... Trust Overlay in P2P Networks -- Detecting Shrew HTTP Flood Attacks for Flash Crowds -- A New Fault...”View full text
Electronic
eBook
3
Published 2014
Table of Contents:
“...: A Literature Survey -- Detection of Web Based Attacks by Analyzing Web Server Log Files -- A Survey...”View full text
Electronic
eBook
4
Published 2008
Table of Contents:
“... Application -- Trustworthy Computing: Theories, Methods, Tools and Experience in China and South East Asia...”View full text
Electronic
eBook
5
Published 2010
Table of Contents:
“... and Trust in the Bounded Confidence Model -- Detection of Image Region-Duplication with Rotation and Scaling...”View full text
Electronic
eBook
6
Published 2008
Table of Contents:
“... of the Tiling Problem -- Remote Entrusting by Run-Time Software Authentication -- Trusted Computing — Special...”View full text
Electronic
eBook
7
Published 2008
Table of Contents:
“... and Solving Approaches -- Employing “Particle Swarm Optimization” and “Fuzzy Ranking Functions” for Direct...”View full text
Electronic
eBook
8
Published 2014
Table of Contents:
“... and Applications -- A Novel Image Retrieval Method Based on Fractal Code and Fuzzy Set -- Velocity Evaluation...”View full text
Electronic
eBook
9
Published 2010
Table of Contents:
“... Performance Computing -- Trust Worthy Architecture for Mobile Ad Hoc Network Environment -- A Cross Layer...”View full text
Electronic
eBook
10
Published 2010
Table of Contents:
“...Green Computing and Health Care Informatics -- Lot-Size Planning with Non-linear Cost Functions...”View full text
Electronic
eBook
11
Published 2010
Table of Contents:
“... for Access Control and Trustiness of Resources in Cloud Computing -- Social Networks -- Modeling of Trust...”View full text
Electronic
eBook
12
Published 2007
Table of Contents:
“...-Infrared Imaging (fNIR) Controlled Brain-Computer Interfaces -- A Sensor Positioning System for Functional...”View full text
Electronic
eBook



