Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
communication documentation » communication foundation, communication communication, communication conversation
documentation based » documentation fast, documentation a, documentation center
based dimensions » based dimension, basic dimensions, based dimensioning
dimensions data » dimension data, dimensional data, dimensions dark
data attacks » dpa attacks, day attacks, ddos attacks
communication documentation » communication foundation, communication communication, communication conversation
documentation based » documentation fast, documentation a, documentation center
based dimensions » based dimension, basic dimensions, based dimensioning
dimensions data » dimension data, dimensional data, dimensions dark
data attacks » dpa attacks, day attacks, ddos attacks
1
Published 2007
Table of Contents:
“... and Consolidation in Transport Logistics Based on Multi-agent Clustering -- Intelligent Agents for Real Time Data...”View full text
Electronic
eBook
2
Published 2015
Table of Contents:
“... Approach for Distributed Denial of Service Attack in Wireless Sensor Network -- Location based Coordinated...”View full text
Electronic
eBook
3
Published 2015
Table of Contents:
“... using a Graph based Approach to Implicitly Find Influential Users -- Ensuring Data Security...”View full text
Electronic
eBook
4
Published 2013
Table of Contents:
“...Adhoc and Sensor Networks -- Perspectives of Sybil Attack in Routing Protocols of Mobile Ad Hoc...”View full text
Electronic
eBook
5
Published 2006
Table of Contents:
“... Communication -- Embodied Conversational Agents: Computing and Rendering Realistic Gaze Patterns -- DBN Based...”View full text
Electronic
eBook
6
Published 2005
Table of Contents:
“... Diagrams -- Building XML Documents and Schemas to Support Object Data Exchange and Communication...”View full text
Electronic
eBook
7
Published 2010
Table of Contents:
“... with Reduced Dimension Using Data Mining Classification Methods and Their Performance Comparison -- Recognition...”View full text
Electronic
eBook
8
Published 2008
Table of Contents:
“... for Source Camera Identification -- Data Recovery from Windows CE Based Handheld Devices -- Legal Issues...”View full text
Electronic
eBook
9
Published 2014
Table of Contents:
“... Extraction and False Minutiae Elimination for Fingerprint Image on FPGA -- Resistive Fractal FSS Based Broad...”View full text
Electronic
eBook
10
Published 2014
Table of Contents:
“... Multiplication for Video Encryption -- Steganography based Secure Communication -- Hierarchy of Communities...”View full text
Electronic
eBook



