Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functions computational » functions computation, function computation, directions computational
detection computational » section computational, prediction computational, interactions computational
programming solving » programming evolving, programming solutions, programming building
solving method » solving methods
method trust » methods trust, method test, method robust
functions computational » functions computation, function computation, directions computational
detection computational » section computational, prediction computational, interactions computational
programming solving » programming evolving, programming solutions, programming building
solving method » solving methods
method trust » methods trust, method test, method robust
1
Publicado 2007
Table of Contents:
“... and Consensus -- A Functional Programming System SFP: Sisal 3.1 Language Structures Decomposition -- Towards a...”Ligazón do recurso
Electrónico
eBook
2
Publicado 2007
Table of Contents:
“... Trust Overlay in P2P Networks -- Detecting Shrew HTTP Flood Attacks for Flash Crowds -- A New Fault...”Ligazón do recurso
Electrónico
eBook
3
Publicado 2014
Table of Contents:
“...: A Literature Survey -- Detection of Web Based Attacks by Analyzing Web Server Log Files -- A Survey...”Ligazón do recurso
Electrónico
eBook
4
Publicado 2008
Table of Contents:
“... Application -- Trustworthy Computing: Theories, Methods, Tools and Experience in China and South East Asia...”Ligazón do recurso
Electrónico
eBook
5
Publicado 2010
Table of Contents:
“... and Trust in the Bounded Confidence Model -- Detection of Image Region-Duplication with Rotation and Scaling...”Ligazón do recurso
Electrónico
eBook
6
Publicado 2008
Table of Contents:
“... of the Tiling Problem -- Remote Entrusting by Run-Time Software Authentication -- Trusted Computing — Special...”Ligazón do recurso
Electrónico
eBook
7
Publicado 2008
Table of Contents:
“... and Solving Approaches -- Employing “Particle Swarm Optimization” and “Fuzzy Ranking Functions” for Direct...”Ligazón do recurso
Electrónico
eBook
8
Publicado 2014
Table of Contents:
“... and Applications -- A Novel Image Retrieval Method Based on Fractal Code and Fuzzy Set -- Velocity Evaluation...”Ligazón do recurso
Electrónico
eBook
9
Publicado 2010
Table of Contents:
“... Performance Computing -- Trust Worthy Architecture for Mobile Ad Hoc Network Environment -- A Cross Layer...”Ligazón do recurso
Electrónico
eBook
10
Publicado 2010
Table of Contents:
“...Green Computing and Health Care Informatics -- Lot-Size Planning with Non-linear Cost Functions...”Ligazón do recurso
Electrónico
eBook
11
Publicado 2010
Table of Contents:
“... for Access Control and Trustiness of Resources in Cloud Computing -- Social Networks -- Modeling of Trust...”Ligazón do recurso
Electrónico
eBook
12
Publicado 2007
Table of Contents:
“...-Infrared Imaging (fNIR) Controlled Brain-Computer Interfaces -- A Sensor Positioning System for Functional...”Ligazón do recurso
Electrónico
eBook



