Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality securing » functionality setting, functionality using, functionality testing
visualization https » globalization https
https functionality » its functionality, bags functionality, cross functionality
securing https » security https, security http, securing rtp
functionality securing » functionality setting, functionality using, functionality testing
visualization https » globalization https
https functionality » its functionality, bags functionality, cross functionality
securing https » security https, security http, securing rtp
1
Published 2013
Table of Contents:
“... Implicit Call Behavioral Graph for Mobile Cloud Computing -- NetSecRadar: A Visualization System...”View full text
Electronic
eBook
2
Published 2013
Table of Contents:
“... Visualization for User-Controlled Online Identity Authentication (Short Paper) -- Secure Computation...”View full text
Electronic
eBook
3
Published 2006
Table of Contents:
“... Principal Geodesic Analysis on Symmetric Spaces -- 2D Shape Modeling using Skeletal Graphs in a Morse...”View full text
Electronic
eBook
4
Published 2015
Table of Contents:
“... of Project Completion Probability using Different Probability Distribution Functions -- Dynamic simulation...”View full text
Electronic
eBook
5
Published 2007
Table of Contents:
“... Design with Fuzzy Functions -- Soft Computing in Medical Image Processing -- Image Analysis of Ductal...”View full text
Electronic
eBook
6
Published 2008
Table of Contents:
“... Encryption -- Taming of Pict -- Classification, Formalization and Verification of Security Functional...”View full text
Electronic
eBook
7
Published 2005
Table of Contents:
“... Distributed Data Structure -- On Some Weighted Satisfiability and Graph Problems -- On the Security...”View full text
Electronic
eBook
8
Published 2005
Table of Contents:
“... for Computationally Secure Information Flow -- Approximation Algorithms -- Algorithms for Graphs Embeddable with Few...”View full text
Electronic
eBook
9
Published 2010
Table of Contents:
“... System for Higher Education Using Graph-Based Visualization Technique -- An Efficient Indexing...”View full text
Electronic
eBook
10
Published 2015
Table of Contents:
“... Visualization of RDF Graphs -- Online Feature Selection based on Passive-Aggressive Algorithm with Retaining...”View full text
Electronic
eBook
11
Published 2015
Table of Contents:
“... -- Visual Exploration of Data with Multithread MIC Computer Architectures -- Random Forests with Weighted...”View full text
Electronic
eBook
12
Published 2007
Table of Contents:
“... Agents -- Using Semantic Causality Graphs to Validate MAS Models -- A Multiagent Framework to Animate...”View full text
Electronic
eBook
13
Published 2014
Table of Contents:
“... Authentication in Security Systems -- Spatial Keypoint Representation for Visual Object Retrieval...”View full text
Electronic
eBook
14
Published 2010
Table of Contents:
“... Computing Environments -- An Efficient Circuit–Switched Broadcasting in Star Graph -- Parallel Domain...”View full text
Electronic
eBook
15
Published 2010
Table of Contents:
“... Processing and Reasoning Based on Graph Representation – A Case Study -- A Real Time Player Tracking System...”View full text
Electronic
eBook
16
Published 2006
Table of Contents:
“... in Agent-Based Evolutionary Optimization -- An Immunological and an Ethically-social Approach to Security...”View full text
Electronic
eBook
17
Published 2014
Table of Contents:
“... Textual Secret Sharing for Confidential Messaging -- AnimVSS: Frame-based Visual Secret Sharing...”View full text
Electronic
eBook
18
Published 2014
Table of Contents:
“... Initialisation Method with Selection of Weights on the Basis of the Function Variability -- Soft Committee...”View full text
Electronic
eBook
19
Published 2015
Table of Contents:
“...-McShane-Stieltjes Integral of Fuzzy-Number-Valued Functions -- A Brief Survey on Fuzzy Cognitive Maps...”View full text
Electronic
eBook
20
Published 2006
Table of Contents:
“... Hermite Polynomial Activation Functions -- A Distributed Branch-and-Bound Algorithm for Computing Optimal...”View full text
Electronic
eBook



