Tópicos Sugeridos dentro de su búsqueda.
Tópicos Sugeridos dentro de su búsqueda.
Buscar alternativas:
communication documentation » communication foundation, communication communication, communication conversation
documentation based » documentation fast, documentation a, documentation center
based dimensions » based dimension, basic dimensions, based dimensioning
dimensions data » dimension data, dimensional data, dimensions dark
data attacks » dpa attacks, day attacks, ddos attacks
communication documentation » communication foundation, communication communication, communication conversation
documentation based » documentation fast, documentation a, documentation center
based dimensions » based dimension, basic dimensions, based dimensioning
dimensions data » dimension data, dimensional data, dimensions dark
data attacks » dpa attacks, day attacks, ddos attacks
1
Publicado 2007
Tabla de Contenidos:
“... and Consolidation in Transport Logistics Based on Multi-agent Clustering -- Intelligent Agents for Real Time Data...”Enlace del recurso
Electrónico
eBook
2
Publicado 2015
Tabla de Contenidos:
“... Approach for Distributed Denial of Service Attack in Wireless Sensor Network -- Location based Coordinated...”Enlace del recurso
Electrónico
eBook
3
Publicado 2015
Tabla de Contenidos:
“... using a Graph based Approach to Implicitly Find Influential Users -- Ensuring Data Security...”Enlace del recurso
Electrónico
eBook
4
Publicado 2013
Tabla de Contenidos:
“...Adhoc and Sensor Networks -- Perspectives of Sybil Attack in Routing Protocols of Mobile Ad Hoc...”Enlace del recurso
Electrónico
eBook
5
Publicado 2006
Tabla de Contenidos:
“... Communication -- Embodied Conversational Agents: Computing and Rendering Realistic Gaze Patterns -- DBN Based...”Enlace del recurso
Electrónico
eBook
6
Publicado 2005
Tabla de Contenidos:
“... Diagrams -- Building XML Documents and Schemas to Support Object Data Exchange and Communication...”Enlace del recurso
Electrónico
eBook
7
Publicado 2010
Tabla de Contenidos:
“... with Reduced Dimension Using Data Mining Classification Methods and Their Performance Comparison -- Recognition...”Enlace del recurso
Electrónico
eBook
8
Publicado 2008
Tabla de Contenidos:
“... for Source Camera Identification -- Data Recovery from Windows CE Based Handheld Devices -- Legal Issues...”Enlace del recurso
Electrónico
eBook
9
Publicado 2014
Tabla de Contenidos:
“... Extraction and False Minutiae Elimination for Fingerprint Image on FPGA -- Resistive Fractal FSS Based Broad...”Enlace del recurso
Electrónico
eBook
10
Publicado 2014
Tabla de Contenidos:
“... Multiplication for Video Encryption -- Steganography based Secure Communication -- Hierarchy of Communities...”Enlace del recurso
Electrónico
eBook



