Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
function method » detection method, selection method
method https » methods https
https server » http server, lts server
function method » detection method, selection method
method https » methods https
https server » http server, lts server
1
Table of Contents:
“...Chap. 1, Introduction -- Chap. 2, Basics of Practically Efficient Secure Function Evaluation...”
View full text
View full text
Electronic
eBook
2
Published 2005
Table of Contents:
“... Security -- Calibrating Entropy Functions Applied to Computer Networks -- A Passive External Web...”View full text
Electronic
eBook
3
Published 2005
Table of Contents:
“...Invited Talks -- Probabilistic Validation of Computer System Survivability -- Timed Asynchronous...”View full text
Electronic
eBook
4
Published 2010
Table of Contents:
“... for Heterogeneous Web Servers -- A Choice of Optimal Packet Dropping Function for Active Queue Management -- A...”View full text
Electronic
eBook
5
Table of Contents:
“... Functions in Structured Peer–to–Peer Overlays -- Methods for Flexible Content Repository Functions in Hybrid...”
View full text
View full text
Electronic
eBook
6
Published 2010
Table of Contents:
“...-Performance of Multi-core Processors -- Internet-Based Virtual Computing Environment -- Session 1...”View full text
Electronic
eBook
7
Published 2005
Table of Contents:
“... Environments -- A Resource-Based Server Performance Control for Grid Computing Systems -- IBP: An Index-Based...”View full text
Electronic
eBook
8
Published 2006
Table of Contents:
“... to Monoprocess Servers -- Delegating Secure Logging in Pervasive Computing Systems -- Implementing Minimized...”View full text
Electronic
eBook
9
Published 2006
Table of Contents:
“...: Distributed Computing and Algorithms I -- Programmer-Centric Conditions for Itanium Memory Consistency -- A...”View full text
Electronic
eBook
10
Published 2012
Table of Contents:
“... Compute Units -- Relationship-Preserving Change Propagation in Process Ecosystems -- Scheduling Service...”View full text
Electronic
eBook
11
Published 2015
Table of Contents:
“... Prediction Using Computational Intelligence Methods -- A Feature-based Machine Learning Agent for Automatic...”View full text
Electronic
eBook
12
Published 2010
Table of Contents:
“... by Means of a Hybrid Functional and Imperative Language -- Hierarchical Place Trees: A Portable Abstraction...”View full text
Electronic
eBook
13
Published 2007
Table of Contents:
“... Computation in Large Territories -- Non-equilibrium Thermodynamics, Thermomechanics, Geodynamics -- A Finite...”View full text
Electronic
eBook
14
Published 2014
Table of Contents:
“...: A Literature Survey -- Detection of Web Based Attacks by Analyzing Web Server Log Files -- A Survey...”View full text
Electronic
eBook
15
Published 2013
Table of Contents:
“... -- Security Aspects of Virtualization in Cloud Computing -- Threshold Method of Detecting Long-Time TPM...”View full text
Electronic
eBook
16
Published 2006
Table of Contents:
“... and Non-functional Requirements -- SOCK: A Calculus for Service Oriented Computing -- A Priori Conformance...”View full text
Electronic
eBook
17
Published 2015
Table of Contents:
“... Pathways.-A Computer Vision Method for the Italian Fingerspelling Recognition.-A Spiking Neural Network...”View full text
Electronic
eBook
18
Published 2013
Table of Contents:
“...Factorization properties for a MAP-modulated fluid flow model under server vacation policies -- A...”View full text
Electronic
eBook
19
Published 2006
Table of Contents:
“... Deployment of Wireless Sensor Network for Environmental Monitoring -- LATONA: An Advanced Server Architecture...”View full text
Electronic
eBook
20
Published 2014
Table of Contents:
“... in Pervasive Computing - Risk Probability Assessment Model -- CPU Load Based Countermeasure Technique...”View full text
Electronic
eBook



