Soggetti all'interno della tua ricerca.
Soggetti all'interno della tua ricerca.
Cerca anche:
communication documentation » communication foundation, communication communication, communication conversation
documentation based » documentation fast, documentation a, documentation center
based dimensions » based dimension, basic dimensions, based dimensioning
dimensions data » dimension data, dimensional data, dimensions dark
data attacks » dpa attacks, day attacks, ddos attacks
communication documentation » communication foundation, communication communication, communication conversation
documentation based » documentation fast, documentation a, documentation center
based dimensions » based dimension, basic dimensions, based dimensioning
dimensions data » dimension data, dimensional data, dimensions dark
data attacks » dpa attacks, day attacks, ddos attacks
1
Pubblicazione 2007
Sommario:
“... and Consolidation in Transport Logistics Based on Multi-agent Clustering -- Intelligent Agents for Real Time Data...”Testo
Elettronico
eBook
2
Pubblicazione 2015
Sommario:
“... Approach for Distributed Denial of Service Attack in Wireless Sensor Network -- Location based Coordinated...”Testo
Elettronico
eBook
3
Pubblicazione 2015
Sommario:
“... using a Graph based Approach to Implicitly Find Influential Users -- Ensuring Data Security...”Testo
Elettronico
eBook
4
Pubblicazione 2013
Sommario:
“...Adhoc and Sensor Networks -- Perspectives of Sybil Attack in Routing Protocols of Mobile Ad Hoc...”Testo
Elettronico
eBook
5
Pubblicazione 2006
Sommario:
“... Communication -- Embodied Conversational Agents: Computing and Rendering Realistic Gaze Patterns -- DBN Based...”Testo
Elettronico
eBook
6
Pubblicazione 2005
Sommario:
“... Diagrams -- Building XML Documents and Schemas to Support Object Data Exchange and Communication...”Testo
Elettronico
eBook
7
Pubblicazione 2010
Sommario:
“... with Reduced Dimension Using Data Mining Classification Methods and Their Performance Comparison -- Recognition...”Testo
Elettronico
eBook
8
Pubblicazione 2008
Sommario:
“... for Source Camera Identification -- Data Recovery from Windows CE Based Handheld Devices -- Legal Issues...”Testo
Elettronico
eBook
9
Pubblicazione 2014
Sommario:
“... Extraction and False Minutiae Elimination for Fingerprint Image on FPGA -- Resistive Fractal FSS Based Broad...”Testo
Elettronico
eBook
10
Pubblicazione 2014
Sommario:
“... Multiplication for Video Encryption -- Steganography based Secure Communication -- Hierarchy of Communities...”Testo
Elettronico
eBook



