Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
https developing » hits developing, steps developing, crops developing
developing data » development data, developing a, developing asia
detecting java » detecting data, dissecting java, detecting a
https developing » hits developing, steps developing, crops developing
developing data » development data, developing a, developing asia
detecting java » detecting data, dissecting java, detecting a
1
Publicado 2005
Table of Contents:
“... for Eliciting User’s Preferences in Web Urban Spaces -- Combining Heterogeneous Spatial Data From Distributed...”Ligazón do recurso
Electrónico
eBook
2
Table of Contents:
“... and Contours -- Corner Detection -- Detecting Simple Curves -- Morphological Filters -- Regions in Binary...”
Ligazón do recurso
Ligazón do recurso
Electrónico
eBook
3
Table of Contents:
“...Introduction -- Automatic Thresholding -- Filters for Color Images -- Edge Detection in Color...”
Ligazón do recurso
Ligazón do recurso
Electrónico
eBook
4
Publicado 2010
Table of Contents:
“... Requests -- Idea: Opcode-Sequence-Based Malware Detection -- Session 2. Attack Analysis and Prevention II...”Ligazón do recurso
Electrónico
eBook
5
Publicado 2007
Table of Contents:
“... Applications in Java 2 Micro Edition -- Pitfalls of Agent System Development on the Basis of a Travel Support...”Ligazón do recurso
Electrónico
eBook
6
Publicado 2005
Table of Contents:
“... on Microprocessors -- Automatic Detection of Saturation and Clipping Idioms -- Compiler Optimizations with DSP...”Ligazón do recurso
Electrónico
eBook
7
Publicado 2010
Table of Contents:
“... Problem -- A Development of Data-Logger for Indoor Environment -- Multiobjective Evolutionary Optimization...”Ligazón do recurso
Electrónico
eBook
8
Publicado 2014
Table of Contents:
“..., Syntax and Parsing -- JMorpher: A Finite-State Morphological Parser in Java for Android -- Tagging...”Ligazón do recurso
Electrónico
eBook
9
Publicado 2014
Table of Contents:
“... and Morphology -- Video Watermarking Scheme Resistant to Rotation and Collusion Attacks -- Development...”Ligazón do recurso
Electrónico
eBook
10
Publicado 2006
Table of Contents:
“... Resistant Exponentiation -- Incorporating Error Detection in an RSA Architecture -- Data and Computational...”Ligazón do recurso
Electrónico
eBook
11
Publicado 2008
Table of Contents:
“... Benchmarking -- Enhancing Privacy in Remote Data Classification -- Minimizing SSO Effort in Verifying SSL Anti...”Ligazón do recurso
Electrónico
eBook
12
Publicado 2010
Table of Contents:
“... Data in Java: Framework Design and Performance Evaluation -- Fighting Spam on the Sender Side: A...”Ligazón do recurso
Electrónico
eBook
13
Publicado 2015
Table of Contents:
“... -- Quo Vadis Explicit-State Model Checking -- The Dos and Dont’s of Crowdsourcing Software Development...”Ligazón do recurso
Electrónico
eBook
14
Publicado 2005
Table of Contents:
“... for Interconnection Constrained Network of Heterogeneous Processors -- Neural Networks -- Detecting Topology...”Ligazón do recurso
Electrónico
eBook
15
Publicado 2006
Table of Contents:
“... -- Intelligent Knowledge Recommendation System Based on Web Log and Cache Data -- Learning Patterns: A Mechanism...”Ligazón do recurso
Electrónico
eBook
16
Publicado 2014
Table of Contents:
“...: model, detection, deblurring -- Software support for Common Criteria security development process...”Ligazón do recurso
Electrónico
eBook
17
Publicado 2010
Table of Contents:
“... Sound Event Recognition Using Support Vector Machine Classifiers -- Noise Tolerant Community Detection...”Ligazón do recurso
Electrónico
eBook
18
Publicado 2010
Table of Contents:
“... Systems -- A Type System for Data-Centric Synchronization -- Type-Safe Eventful Sessions in Java...”Ligazón do recurso
Electrónico
eBook
19
Publicado 2007
Table of Contents:
“... and Accurate Static Data-Race Detection for Concurrent Programs -- Parametric and Sliced Causality -- Spade...”Ligazón do recurso
Electrónico
eBook
20
Publicado 2015
Table of Contents:
“...A Survey of Security Concerns in Various Data Aggregation Techniques in Wireless Sensor Networks...”Ligazón do recurso
Electrónico
eBook
- 1
- 2
- 3
- Seguinte »
- [3]



