1
Published 2014
Table of Contents: ... Classification based Detection of Malicious Executables Using Soft Computing Techniques on Exhaustive Feature Set...
View full text
Electronic eBook
2
Published 2005
Table of Contents: ... on the Grid Using Irregular Array Distributions -- Dynamic Adaptation for Grid Computing -- Improving...
View full text
Electronic eBook
3
Published 2013
Table of Contents: ...-specific Characteristics -- The Application of Information Security on the Computer Terminals of 3rd...
View full text
Electronic eBook
4
Published 2015
Table of Contents: ... in Multicultural Settings -- Comparison of M5’ Model Tree with MLR in the development of fault prediction models...
View full text
Electronic eBook
5
Published 2012
Table of Contents: ... Segmentation Based on Neuronal Activation Degree of Visual Model.- One-Dimensional-Array Millimeter-Wave...
View full text
Electronic eBook
6
Published 2014
Table of Contents: ... Depth Map Restoration -- Online Detection of Concept Drift in Visual Tracking -- Temporally Regularized...
View full text
Electronic eBook