Search alternatives:
dimension exploiting » dimension exploring, extensions exploiting, design exploiting
detection exploiting » extraction exploiting, detection evaluating, restoration exploiting
communication from » communication fast
1
Published 2015
Table of Contents: ... and Exploiting the Cyber High Ground with Botnets -- Attribution, Temptation, and Expectation: A Formal Framework...
View full text
Electronic eBook
2
Published 2008
Table of Contents: ... -- Forensic Web Services -- Detecting Remote Exploits Using Data Mining -- Portable Electronic Device...
View full text
Electronic eBook
3
Published 2008
Table of Contents: ... -- Identifying and Exploiting Group Learning Patterns for Counterterrorism -- Homeland Insecurity -- Terrorism...
View full text
Electronic eBook
4
Published 2005
Table of Contents: ... and the Intrusion of Non-linguistic Communication into Utterances -- Mobile Phone Talk in Context -- Unsupervised...
View full text
Electronic eBook
5
Published 2013
Table of Contents: ... Allocation of High Dimensional Assets through Canonical Vines -- Inducing Context Gazetteers from...
View full text
Electronic eBook
6
Published 2008
Table of Contents: ..., Time, and Agents -- Benefits of Constrained Interactivity in Using a Three-Dimensional Diagram -- A...
View full text
Electronic eBook
7
Published 2014
Table of Contents: ... Annealing Method -- A Single Curve Piecewise Fitting Method for Detecting Valve Stiction and Quantification...
View full text
Electronic eBook
8
Published 2010
Table of Contents: ... Classification -- On Optimization of Coefficient-Sensitivity and State-Structure for Two Dimensional (2-D...
View full text
Electronic eBook