Search alternatives:
communication information » communication international, communication education
from dimension » flow dimension, first dimension, forms dimension
data attack » data attacks, bat attack, metal attack
dpa attack » dpa attacks, dos attack, dog attack
1
Published 2007
Table of Contents: ...Invited Talks -- Peer-to-Peer Data Mining, Privacy Issues, and Games -- Ontos Solutions...
View full text
Electronic eBook
2
Published 2005
Table of Contents: ... Semantics from Dance Videos -- BioPubMiner: Machine Learning Component-Based Biomedical Information Analysis...
View full text
Electronic eBook
3
Published 2010
Table of Contents: ... Information in an Image -- Knowledge Discovery from Web Usage Data: A Survey of Web Usage Pre-processing...
View full text
Electronic eBook
4
Published 2013
Table of Contents: ... Allocation of High Dimensional Assets through Canonical Vines -- Inducing Context Gazetteers from...
View full text
Electronic eBook
5
Published 2006
Table of Contents: ...-2 to AVS Transcoding -- Persian Text Watermarking -- Three Dimensional Reconstruction of Structured...
View full text
Electronic eBook
6
Published 2013
Table of Contents: ... Engineering for E-Voting System -- Analysis of 3 Dimensional Object Watermarking Techniques -- Graph Based...
View full text
Electronic eBook
7
Published 2005
Table of Contents: ... Quality Dimensions for Information Systems Security: A Theoretical Exposition (Invited Paper) -- From XML...
View full text
Electronic eBook
8
Published 2015
Table of Contents: ... Algorithm -- Bi-dimensional Statistical Empirical Mode Decomposition based Video Analysis for Detecting...
View full text
Electronic eBook
9
Published 2015
Table of Contents: ... -- Efficient Microarray Data Classification with Three Stage Dimensionality Reduction -- Trends in Citation...
View full text
Electronic eBook
10
Published 2013
Table of Contents: ... Antennas -- Novel Protection from Internal Attacks in Wireless Sensor Networks -- Channel-Usage Model...
View full text
Electronic eBook
11
Published 2015
Table of Contents: ... Against Sophisticated Cyber Attacks -- Graph Mining for Cyber Security -- Programming language theoretic...
View full text
Electronic eBook
12
Published 2013
Table of Contents: ... in Financial Networks -- Stealing Reality: When Criminals Become Data Scientists (or Vice Versa...
View full text
Electronic eBook
13
Published 2006
Table of Contents: ... New Key Assignment Scheme for Access Control in a Complete Tree Hierarchy -- Multi-Dimensional Hash...
View full text
Electronic eBook
14
Published 2010
Table of Contents: ... -- Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks -- Protecting...
View full text
Electronic eBook
15
Published 2005
Table of Contents: ...-dimensional Queries Using Bitmap Indices -- Environmental Noise Classification for Multimedia Libraries...
View full text
Electronic eBook
16
Published 2012
Table of Contents: ... Computing for the Resiliency of Protecting from Internal Attacks in Distributed Wireless Sensor -- Parallel...
View full text
Electronic eBook
17
Published 2012
Table of Contents: ... Using Pseudo Random Sequences Generated from Stream Ciphers -- Exploring Object-Level Parallelism...
View full text
Electronic eBook
18
Published 2005
Table of Contents: ... Infrastructure-Based Networked Systems -- Transportation, Communication and Sustainability: In Search of a...
View full text
Electronic eBook
19
Published 2007
Table of Contents: ... Networks -- Securing Passive Optical Networks Against Signal Injection Attacks -- Novel Passive Optical...
View full text
Electronic eBook
20
Published 2008
Table of Contents: ... Taxonomy to Digital Forensics -- Evidence Recovery -- Recovering Data from Failing Floppy Disks...
View full text
Electronic eBook