Foreslåede emner i din søgning.
Foreslåede emner i din søgning.
Søg alternativer:
extensions exploiting » expansion exploiting, extensions supporting, explanations exploiting
detection exploiting » extraction exploiting, detection evaluating, restoration exploiting
communication from » communication fast
extensions exploiting » expansion exploiting, extensions supporting, explanations exploiting
detection exploiting » extraction exploiting, detection evaluating, restoration exploiting
communication from » communication fast
1
Udgivet 2005
Indholdsfortegnelse:
“... Path Monitoring in IP Networks -- Exploiting the IPID Field to Infer Network Path and End-System...”Få fuldtekst
Electronisk
eBog
2
Udgivet 2008
Indholdsfortegnelse:
“... of Component Controllers -- Analysis of Component Model Extensions to Support the GriCoL Language -- Resource...”Få fuldtekst
Electronisk
eBog
3
Udgivet 2006
Indholdsfortegnelse:
“... Protection Overlay -- An Extensible and Flexible System for Network Anomaly Detection -- Design...”Få fuldtekst
Electronisk
eBog
4
Udgivet 2008
Indholdsfortegnelse:
“... System Detection -- De-triangulation Optimal Solutions for Mobility Scenarios with Asymmetric Links...”Få fuldtekst
Electronisk
eBog
5
Udgivet 2008
Indholdsfortegnelse:
“... with Multi-seeds Detection and Parallel Extension -- Highly Space Efficient Counters for Perl Compatible...”Få fuldtekst
Electronisk
eBog
6
Udgivet 2005
Indholdsfortegnelse:
“... Communication Devices -- CORDIC-Augmented Sandbridge Processor for Channel Equalization -- Power-Aware Branch...”Få fuldtekst
Electronisk
eBog
7
Udgivet 2006
Indholdsfortegnelse:
“... -- Full Papers Humanoid -- Exploiting the Unexpected: Negative Evidence Modeling and Proprioceptive Motion...”Få fuldtekst
Electronisk
eBog
8
Udgivet 2005
Indholdsfortegnelse:
“... Tool for Relation Extraction from Text in Ontology Extension -- Containment and Minimization of RDF...”Få fuldtekst
Electronisk
eBog
9
Udgivet 2008
Indholdsfortegnelse:
“... NIST Primes on Commercial FPGAs -- Exploiting the Power of GPUs for Asymmetric Cryptography -- Fault...”Få fuldtekst
Electronisk
eBog
10
Udgivet 2010
Indholdsfortegnelse:
“... -- From IT Governance to Enterprise Governance of IT: A Journey for Creating Business Value Out...”Få fuldtekst
Electronisk
eBog
11
Udgivet 2005
Indholdsfortegnelse:
“... Quantization Parameters for Mode Decision in Scalable Extension of H.264/AVC Video Codec -- A Metadata Model...”Få fuldtekst
Electronisk
eBog
12
af Zolghadri, Ali., Zolghadri, Ali., Henry, David., Cieslak, Jérôme., Efimov, Denis., Goupil, Philippe.
Udgivet 2014
Indholdsfortegnelse:
“... Detection in Aircraft Control Surface Servo-Loop: Oscillatory Failure Case -- Robust Fault Detection...”Udgivet 2014
Få fuldtekst
Electronisk
eBog
13
Udgivet 2015
Indholdsfortegnelse:
“... Tools Infrastructures -- Low-Overhead Detection of Memory Access Patterns and Their Time Evolution...”Få fuldtekst
Electronisk
eBog
14
Udgivet 2015
Indholdsfortegnelse:
“... Techniques For Rare Patterns Detection in the Industrial Field -- Strategic Decision-making from...”Få fuldtekst
Electronisk
eBog
15
Udgivet 2013
Indholdsfortegnelse:
“...Discovering Local Subgroups, with an Application to Fraud Detection -- PUF-Tree: A Compact Tree...”Få fuldtekst
Electronisk
eBog
16
Udgivet 2006
Indholdsfortegnelse:
“... Exploiting a Hierarchical Fuzzy Categorization -- Query Phrase Suggestion from Topically Tagged Session Logs...”Få fuldtekst
Electronisk
eBog



