Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functions computation » function computation, functions composition, function composition
section computational » prediction computational, design computational, effective computational
theory coding » theory colin, theory choosing
using theory » nursing theory, queuing theory, testing theory
functions computation » function computation, functions composition, function composition
section computational » prediction computational, design computational, effective computational
theory coding » theory colin, theory choosing
using theory » nursing theory, queuing theory, testing theory
1
Published 2008
Table of Contents:
“... in Vehicles -- Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data -- Security...”View full text
Electronic
eBook
2
Published 2008
Table of Contents:
“...Keynote Addresses -- Extreme Computing on the Distributed European Infrastructure...”View full text
Electronic
eBook
3
Published 2014
Table of Contents:
“...Visual Dictionary Pruning Using Mutual Information and Information Gain -- Mining Telecommunication...”View full text
Electronic
eBook
4
Published 2008
Table of Contents:
“... Transmitter: A Fast Design Cycle Using OFDM Framework in Bluespec -- SoC -- A Real-Time Programming Model...”View full text
Electronic
eBook
5
Published 2014
Table of Contents:
“...-organized Learning in Software Factory: Experiences and Lessons Learned -- Part Methods and Metrics -- Using...”View full text
Electronic
eBook
6
Published 2014
Table of Contents:
“... Grid -- Network Selection Mechanism for Future Generation Network Using Game Theory Model -- Research...”View full text
Electronic
eBook
7
Published 2008
Table of Contents:
“... of Trivium -- Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical...”View full text
Electronic
eBook
8
Published 2008
Table of Contents:
“... Requirements -- Cryptanalysis -- Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box...”View full text
Electronic
eBook
9
Table of Contents:
“... -- Programming Principles and Guidelines -- Testing Methodologies -- Defect Analysis and Prevention....”
View full text
View full text
Electronic
eBook
10
Published 2007
Table of Contents:
“... -- Visualization of Five Erosion Risk Classes using Kernel Discriminants -- Computer Security and Safety...”View full text
Electronic
eBook
11
Published 2012
Table of Contents:
“... Using ηT Pairing over GF(397) -- On the (Im)possibility of Projecting Property in Prime-Order Setting...”View full text
Electronic
eBook
12
Published 2014
Table of Contents:
“... for Mathematical Theory Exploration -- New Approaches in Black Box Group Theory -- A GAP Package for Computing...”View full text
Electronic
eBook
13
Published 2008
Table of Contents:
“... Programming System Using Imitation -- Embodiment and Perceptual Crossing in 2D -- Navigation and Internal...”View full text
Electronic
eBook
14
Published 2013
Table of Contents:
“... in Metallic Samples Using Chaos Theory -- Computational Representation of Porous Media Features (Porosity...”View full text
Electronic
eBook



