Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
problems detecting » problems affecting, problems testing, problems creating
problems extended » problem extended, problems existence, problems extension
problems detecting » problems affecting, problems testing, problems creating
problems extended » problem extended, problems existence, problems extension
1
Published 2010
Table of Contents:
“... Admission Control Algorithms for IEEE 802.16 Networks in Simulations with L2S Physical Layer Abstraction...”View full text
Electronic
eBook
2
Published 2006
Table of Contents:
“... Architectures -- Dynamic Layer-2 VPN Services for Improving Security in the Grid Environment -- A P2P Content...”View full text
Electronic
eBook
3
Published 2012
Table of Contents:
“... of Service Attack Detection Using KPCA and PSO-SVM -- 58.The Analysis of Communication Behaviors Based...”View full text
Electronic
eBook
4
Published 2010
Table of Contents:
“... for Multi-layer Text Classification -- Frequent Itemset Based Hierarchical Document Clustering Using...”View full text
Electronic
eBook
5
Published 2005
Table of Contents:
“... in NaradaBrokering -- 2-Layered Metadata Service Model in Grid Environment -- pKSS: An Efficient Keyword Search...”View full text
Electronic
eBook
6
Published 2010
Table of Contents:
“...Track 1 - Satellite Communications: Coding and Modulation -- Overview of PHY-Layer Design...”View full text
Electronic
eBook
7
Published 2006
Table of Contents:
“... Communications Security -- An Efficient Scheme for Detecting Malicious Nodes in Mobile Ad Hoc Networks -- Mobile...”View full text
Electronic
eBook
8
Published 2008
Table of Contents:
“...-Synchronizing Stream Ciphers -- Analysis of RC4 and Proposal of Additional Layers for Better Security Margin...”View full text
Electronic
eBook
9
Published 2015
Table of Contents:
“... -- Systems and Applications -- An Efficient and Flexible FPGA Implementation of a Face Detection System -- A...”View full text
Electronic
eBook
10
Published 2013
Table of Contents:
“... Papers -- Manipulating LTL Formulas Using Spot 1.0 -- Rabinizer 2: Small Deterministic Automata for LTL...”View full text
Electronic
eBook
11
Published 2010
Table of Contents:
“... for Company Communication and Service Design -- A Problem-Centered Collaborative Tutoring System for Teachers...”View full text
Electronic
eBook
12
Published 2007
Table of Contents:
“...Roadmapping and i-Systems -- Exploring Computational Scheme of Complex Problem Solving Based...”View full text
Electronic
eBook
13
Published 2010
Table of Contents:
“...: Transactions Based on Security Questions and Image -- CloneManager: A Tool for Detection of Type1 and Type2...”View full text
Electronic
eBook
14
Published 2007
Table of Contents:
“... Trust Overlay in P2P Networks -- Detecting Shrew HTTP Flood Attacks for Flash Crowds -- A New Fault...”View full text
Electronic
eBook
15
Published 2007
Table of Contents:
“... of the DECOS Fault-Tolerant Communication Layer -- Achieving Highly Reliable Embedded Software: An Empirical...”View full text
Electronic
eBook



