Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
communication documentation » communication foundation, communication communication, communication conversation
documentation based » documentation fast, documentation a, documentation center
based dimensions » based dimension, basic dimensions, based dimensioning
dimensions data » dimension data, dimensional data, dimensions dark
data attacks » dpa attacks, day attacks, ddos attacks
communication documentation » communication foundation, communication communication, communication conversation
documentation based » documentation fast, documentation a, documentation center
based dimensions » based dimension, basic dimensions, based dimensioning
dimensions data » dimension data, dimensional data, dimensions dark
data attacks » dpa attacks, day attacks, ddos attacks
1
Publicado 2007
Table of Contents:
“... and Consolidation in Transport Logistics Based on Multi-agent Clustering -- Intelligent Agents for Real Time Data...”Ligazón do recurso
Electrónico
eBook
2
Publicado 2015
Table of Contents:
“... Approach for Distributed Denial of Service Attack in Wireless Sensor Network -- Location based Coordinated...”Ligazón do recurso
Electrónico
eBook
3
Publicado 2015
Table of Contents:
“... using a Graph based Approach to Implicitly Find Influential Users -- Ensuring Data Security...”Ligazón do recurso
Electrónico
eBook
4
Publicado 2013
Table of Contents:
“...Adhoc and Sensor Networks -- Perspectives of Sybil Attack in Routing Protocols of Mobile Ad Hoc...”Ligazón do recurso
Electrónico
eBook
5
Publicado 2006
Table of Contents:
“... Communication -- Embodied Conversational Agents: Computing and Rendering Realistic Gaze Patterns -- DBN Based...”Ligazón do recurso
Electrónico
eBook
6
Publicado 2005
Table of Contents:
“... Diagrams -- Building XML Documents and Schemas to Support Object Data Exchange and Communication...”Ligazón do recurso
Electrónico
eBook
7
Publicado 2010
Table of Contents:
“... with Reduced Dimension Using Data Mining Classification Methods and Their Performance Comparison -- Recognition...”Ligazón do recurso
Electrónico
eBook
8
Publicado 2008
Table of Contents:
“... for Source Camera Identification -- Data Recovery from Windows CE Based Handheld Devices -- Legal Issues...”Ligazón do recurso
Electrónico
eBook
9
Publicado 2014
Table of Contents:
“... Extraction and False Minutiae Elimination for Fingerprint Image on FPGA -- Resistive Fractal FSS Based Broad...”Ligazón do recurso
Electrónico
eBook
10
Publicado 2014
Table of Contents:
“... Multiplication for Video Encryption -- Steganography based Secure Communication -- Hierarchy of Communities...”Ligazón do recurso
Electrónico
eBook



