1
Table of Contents: ... -- Primary Cosmic Radiation and Astrophysical Aspects -- II -- Common Shower Properties, Observables and Data...
View full text
Electronic eBook
2
Published 2014
Table of Contents: ... -- An Extensible Framework for Web Application Vulnerabilities Visualization and Analysis -- A Combination...
View full text
Electronic eBook
3
Published 2008
Table of Contents: ... Standard -- Vortex: A New Family of One-Way Hash Functions Based on AES Rounds and Carry-Less...
View full text
Electronic eBook
4
Published 2012
Table of Contents: ... for Classification in DataMining -- Variety of Cortical Pathways Formed by Topographic Neural Projection: A...
View full text
Electronic eBook
5
by Metzler, Donald., Metzler, Donald.
Published 2011
Subjects: ...Information storage and retrieval....
View full text
Electronic eBook
6
Published 2007
Table of Contents: ... Unified Way for ECC Scalar Multiplication – Ring Extension Method -- Secure Signed Radix-r Recoding...
View full text
Electronic eBook
7
Subjects: ...Data structures (Computer science)....
View full text
Electronic eBook
8
Table of Contents: ... Performance -- E-Commerce: Regulatory, Ethical, and Social Environments -- Launching a Successful Online...
View full text
Electronic eBook
9
Table of Contents: ...Metric Searching in a Nutshell -- Foundations of Metric Space Searching -- Survey of Existing...
View full text
Electronic eBook
10
by Kleinman, Ken.
Published 2011
Subjects: ...Mathematical statistics Data processing....
Book
11
Published 2010
Table of Contents: ... Public and Privacy-Free Sensing Information with a Personal Digital Assistant -- The Open Data Format...
View full text
Electronic eBook
12
Table of Contents: ... -- Reusable meaning -- Open information sharing -- "Pull" instead of "Push" -- NoSQL and "Big Data" -- Think...
View full text
Electronic eBook
13
Published 2008
Table of Contents: ...Tabular Data Protection -- Using a Mathematical Programming Modeling Language for Optimal CTA -- A...
View full text
Electronic eBook
14
Published 2007
Table of Contents: ... Minority -- Information-Theoretic Security Without an Honest Majority -- Black-Box Extension Fields...
View full text
Electronic eBook
15
by Maes, Roel., Maes, Roel.
Published 2013
Table of Contents: .... 6 - PUF-Based Key Generation -- Chap. 7 - Conclusion and Future Work -- App. A - Notation...
View full text
Electronic eBook
16
Published 2015
Table of Contents: ... an Artificial Neural Network to Predict Loop Transformation Time -- Using Parity-N problems as a way to compare...
View full text
Electronic eBook
17
Published 2008
Table of Contents: ... Interoperability in Archaeological Datasets: Data Mapping and Extraction Via the CIDOC CRM -- Annotations: A Way...
View full text
Electronic eBook
18
by Davis, Pat, 1968-.
Published 2011
Subjects: ...Architectural design Data processing....
Cover image
Book
19
Published 2010
Table of Contents: ...Monitoring Service Level Agreements in Grids with support of a Grid Benchmarking Service...
View full text
Electronic eBook
20
Published 2011
Table of Contents: ...Introduction to Recommender Systems Handbook -- Part I Basic Techniques -- Data Mining Methods...
View full text
Electronic eBook