Search alternatives:
functionality securing » functionality setting, functionality using, functionality testing
visualization https » globalization https
https functionality » its functionality, bags functionality, cross functionality
securing https » security https, security http, securing rtp
1
Published 2013
Table of Contents: ... Implicit Call Behavioral Graph for Mobile Cloud Computing -- NetSecRadar: A Visualization System...
View full text
Electronic eBook
2
Published 2013
Table of Contents: ... Visualization for User-Controlled Online Identity Authentication (Short Paper) -- Secure Computation...
View full text
Electronic eBook
3
Published 2006
Table of Contents: ... Principal Geodesic Analysis on Symmetric Spaces -- 2D Shape Modeling using Skeletal Graphs in a Morse...
View full text
Electronic eBook
4
Published 2015
Table of Contents: ... of Project Completion Probability using Different Probability Distribution Functions -- Dynamic simulation...
View full text
Electronic eBook
5
Published 2007
Table of Contents: ... Design with Fuzzy Functions -- Soft Computing in Medical Image Processing -- Image Analysis of Ductal...
View full text
Electronic eBook
6
Published 2008
Table of Contents: ... Encryption -- Taming of Pict -- Classification, Formalization and Verification of Security Functional...
View full text
Electronic eBook
7
Published 2005
Table of Contents: ... Distributed Data Structure -- On Some Weighted Satisfiability and Graph Problems -- On the Security...
View full text
Electronic eBook
8
Published 2005
Table of Contents: ... for Computationally Secure Information Flow -- Approximation Algorithms -- Algorithms for Graphs Embeddable with Few...
View full text
Electronic eBook
9
Published 2010
Table of Contents: ... System for Higher Education Using Graph-Based Visualization Technique -- An Efficient Indexing...
View full text
Electronic eBook
10
Published 2015
Table of Contents: ... Visualization of RDF Graphs -- Online Feature Selection based on Passive-Aggressive Algorithm with Retaining...
View full text
Electronic eBook
11
Published 2015
Table of Contents: ... -- Visual Exploration of Data with Multithread MIC Computer Architectures -- Random Forests with Weighted...
View full text
Electronic eBook
12
Published 2007
Table of Contents: ... Agents -- Using Semantic Causality Graphs to Validate MAS Models -- A Multiagent Framework to Animate...
View full text
Electronic eBook
13
Published 2014
Table of Contents: ... Authentication in Security Systems -- Spatial Keypoint Representation for Visual Object Retrieval...
View full text
Electronic eBook
14
Published 2010
Table of Contents: ... Computing Environments -- An Efficient Circuit–Switched Broadcasting in Star Graph -- Parallel Domain...
View full text
Electronic eBook
15
Published 2010
Table of Contents: ... Processing and Reasoning Based on Graph Representation – A Case Study -- A Real Time Player Tracking System...
View full text
Electronic eBook
16
Published 2006
Table of Contents: ... in Agent-Based Evolutionary Optimization -- An Immunological and an Ethically-social Approach to Security...
View full text
Electronic eBook
17
Published 2014
Table of Contents: ... Textual Secret Sharing for Confidential Messaging -- AnimVSS: Frame-based Visual Secret Sharing...
View full text
Electronic eBook
18
Published 2014
Table of Contents: ... Initialisation Method with Selection of Weights on the Basis of the Function Variability -- Soft Committee...
View full text
Electronic eBook
19
Published 2015
Table of Contents: ...-McShane-Stieltjes Integral of Fuzzy-Number-Valued Functions -- A Brief Survey on Fuzzy Cognitive Maps...
View full text
Electronic eBook
20
Published 2006
Table of Contents: ... Hermite Polynomial Activation Functions -- A Distributed Branch-and-Bound Algorithm for Computing Optimal...
View full text
Electronic eBook