Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
communication documentation » communication foundation, communication communication, communication conversation
documentation 2 » documentation _, documentation a, documentation 1
2 dimensions » _ dimensions, 2 dimensional, new dimensions
data attacks » dpa attacks, day attacks, ddos attacks
data attack » dpa attack, bat attack, metal attack
data stack » data sptrack, data state
communication documentation » communication foundation, communication communication, communication conversation
documentation 2 » documentation _, documentation a, documentation 1
2 dimensions » _ dimensions, 2 dimensional, new dimensions
data attacks » dpa attacks, day attacks, ddos attacks
data attack » dpa attack, bat attack, metal attack
data stack » data sptrack, data state
1
Published 2007
Table of Contents:
“...Invited Talks -- Peer-to-Peer Data Mining, Privacy Issues, and Games -- Ontos Solutions...”View full text
Electronic
eBook
2
Published 2005
Table of Contents:
“... Diagrams -- Building XML Documents and Schemas to Support Object Data Exchange and Communication...”View full text
Electronic
eBook
3
Published 2006
Table of Contents:
“... Attack -- Perceptual Depth Estimation from a Single 2D Image Based on Visual Perception Theory -- A...”View full text
Electronic
eBook
4
Published 2010
Table of Contents:
“... with Reduced Dimension Using Data Mining Classification Methods and Their Performance Comparison -- Recognition...”View full text
Electronic
eBook
5
Published 2015
Table of Contents:
“...A Survey of Security Concerns in Various Data Aggregation Techniques in Wireless Sensor Networks...”View full text
Electronic
eBook
6
Published 2013
Table of Contents:
“... for Points moving in a Euclidean Two-Dimensions Plane -- Low Complexity Speech Enhancement Algorithm...”View full text
Electronic
eBook
7
Published 2015
Table of Contents:
“... Retrieval -- Fuzzy Mapping of Robotic Arm Based on LabVIEW -- An Improvement on NSGA-II for Finding Fast...”View full text
Electronic
eBook
8
Published 2014
Table of Contents:
“... Reconfigurable Coprocessor for Next Generation Communication Platform -- Secret Code Authentication Using...”View full text
Electronic
eBook
9
Published 2014
Table of Contents:
“... Algorithm -- Comparative Performance Analysis of Particle Swarm Optimization and Interval Type-2 Fuzzy Logic...”View full text
Electronic
eBook



