Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
communication information » communication international, communication education
from dimension » flow dimension, first dimension, forms dimension
data attack » data attacks, bat attack, metal attack
dpa attack » dpa attacks, dos attack, dog attack
communication information » communication international, communication education
from dimension » flow dimension, first dimension, forms dimension
data attack » data attacks, bat attack, metal attack
dpa attack » dpa attacks, dos attack, dog attack
1
Published 2007
Table of Contents:
“...Invited Talks -- Peer-to-Peer Data Mining, Privacy Issues, and Games -- Ontos Solutions...”View full text
Electronic
eBook
2
Published 2005
Table of Contents:
“... Semantics from Dance Videos -- BioPubMiner: Machine Learning Component-Based Biomedical Information Analysis...”View full text
Electronic
eBook
3
Published 2010
Table of Contents:
“... Information in an Image -- Knowledge Discovery from Web Usage Data: A Survey of Web Usage Pre-processing...”View full text
Electronic
eBook
4
Published 2013
Table of Contents:
“... Allocation of High Dimensional Assets through Canonical Vines -- Inducing Context Gazetteers from...”View full text
Electronic
eBook
5
Published 2006
Table of Contents:
“...-2 to AVS Transcoding -- Persian Text Watermarking -- Three Dimensional Reconstruction of Structured...”View full text
Electronic
eBook
6
Published 2013
Table of Contents:
“... Engineering for E-Voting System -- Analysis of 3 Dimensional Object Watermarking Techniques -- Graph Based...”View full text
Electronic
eBook
7
Published 2005
Table of Contents:
“... Quality Dimensions for Information Systems Security: A Theoretical Exposition (Invited Paper) -- From XML...”View full text
Electronic
eBook
8
Published 2015
Table of Contents:
“... Algorithm -- Bi-dimensional Statistical Empirical Mode Decomposition based Video Analysis for Detecting...”View full text
Electronic
eBook
9
Published 2015
Table of Contents:
“... -- Efficient Microarray Data Classification with Three Stage Dimensionality Reduction -- Trends in Citation...”View full text
Electronic
eBook
10
Published 2013
Table of Contents:
“... Antennas -- Novel Protection from Internal Attacks in Wireless Sensor Networks -- Channel-Usage Model...”View full text
Electronic
eBook
11
Published 2015
Table of Contents:
“... Against Sophisticated Cyber Attacks -- Graph Mining for Cyber Security -- Programming language theoretic...”View full text
Electronic
eBook
12
Published 2013
Table of Contents:
“... in Financial Networks -- Stealing Reality: When Criminals Become Data Scientists (or Vice Versa...”View full text
Electronic
eBook
13
Published 2006
Table of Contents:
“... New Key Assignment Scheme for Access Control in a Complete Tree Hierarchy -- Multi-Dimensional Hash...”View full text
Electronic
eBook
14
Published 2010
Table of Contents:
“... -- Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks -- Protecting...”View full text
Electronic
eBook
15
Published 2005
Table of Contents:
“...-dimensional Queries Using Bitmap Indices -- Environmental Noise Classification for Multimedia Libraries...”View full text
Electronic
eBook
16
Published 2012
Table of Contents:
“... Computing for the Resiliency of Protecting from Internal Attacks in Distributed Wireless Sensor -- Parallel...”View full text
Electronic
eBook
17
Published 2012
Table of Contents:
“... Using Pseudo Random Sequences Generated from Stream Ciphers -- Exploring Object-Level Parallelism...”View full text
Electronic
eBook
18
Published 2005
Table of Contents:
“... Infrastructure-Based Networked Systems -- Transportation, Communication and Sustainability: In Search of a...”View full text
Electronic
eBook
19
Published 2007
Table of Contents:
“... Networks -- Securing Passive Optical Networks Against Signal Injection Attacks -- Novel Passive Optical...”View full text
Electronic
eBook
20
Published 2008
Table of Contents:
“... Taxonomy to Digital Forensics -- Evidence Recovery -- Recovering Data from Failing Floppy Disks...”View full text
Electronic
eBook



