1
by Unpingco, José., Unpingco, José.
Published 2014
Subjects: ...Signal, Image and Speech Processing. https://scigraph.springernature.com/ontologies/product-market...
View full text
Electronic eBook
2
Subjects: ...Data encryption (Computer science)....
View full text
Electronic eBook
3
Published 2008
Table of Contents: ... Techniques for Data Mining -- On the Stochastic Geometry of Birth-and-Growth Processes. Application...
View full text
Electronic eBook
4
Published 2015
Table of Contents: ... -- Pyverilog: A Python-Based Hardware Design Processing Toolkit for Verilog HDL -- Special Session 1: Funded R...
View full text
Electronic eBook
5
Published 2011
Table of Contents: ...MATERIAL STRUCTURE -- Bionic (Nano)Membranes -- Tribology in Biology -- Python Regius (Ball Python...
View full text
Electronic eBook
6
Published 2015
Table of Contents: ...-To-End Authentication for Mobile Banking -- Improving Mutation Testing Process of Python Programs -- Task...
View full text
Electronic eBook
7
Table of Contents: ...Jython, Java and jHepWork -- to Jython -- Mathematical Functions -- One-dimensional Data -- Two...
View full text
Electronic eBook
8
Table of Contents: ...: Bode plots and transfer functions -- Frequency domain II: Fourier analysis and power spectra...
View full text
Electronic eBook
9
by Smith, Joshua B., Smith, Joshua B.
Published 2007
Table of Contents: ... -- Understanding Functions -- Practical: Creating a Simple Database -- Primitive and Composite Types -- Practical...
View full text
Electronic eBook
10
...Authentication is a security function that ensures the system’s proper security by identifying...
Article