Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
communication information » communication international, communication education
optimization applying » optimization applied, optimization solving, optimization exploiting
detection exploiting » extraction exploiting, detection evaluating, restoration exploiting
communication information » communication international, communication education
optimization applying » optimization applied, optimization solving, optimization exploiting
detection exploiting » extraction exploiting, detection evaluating, restoration exploiting
1
Published 2010
Table of Contents:
“... Trends -- Compound Analytics of Compound Data within RDBMS Framework – Infobright’s Perspective -- From...”View full text
Electronic
eBook
2
Published 2012
Table of Contents:
“... of Intrusion Detection in Control System Communication Based on Outlier Detection with One-Class Classifiers...”View full text
Electronic
eBook
3
Published 2010
Table of Contents:
“... -- Chinese New Word Detection from Query Logs -- Exploiting Concept Clumping for Efficient Incremental E-Mail...”View full text
Electronic
eBook
4
Published 2010
Table of Contents:
“...Information and Data Management -- A New Approach for Fingerprint Matching Using Logic Synthesis...”View full text
Electronic
eBook
5
Published 2014
Table of Contents:
“... Codes on Many-Core Computer Architectures.- Performance Predictions of Multilevel Communication Optimal...”View full text
Electronic
eBook
6
Published 2007
Table of Contents:
“... Model for Detecting Web Spam -- Applied Computational Trust in Utilities Management: a Case Study...”View full text
Electronic
eBook
7
Published 2008
Table of Contents:
“... for Controlling a Mobile Wheeled Pendulum Robot -- Knowledge Management -- Optimizing Relationships Information...”View full text
Electronic
eBook
8
Published 2005
Table of Contents:
“...-fuzzy Logic in Signal Processing for Communications: From Bits to Protocols -- Connected Operators...”View full text
Electronic
eBook
9
Published 2007
Table of Contents:
“... Intelligence? -- Applying Machine Learning Techniques for Detection of Malicious Code in Network Traffic...”View full text
Electronic
eBook



