Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
interference evaluation » preference evaluation, interface evaluation, interference mitigation
evaluation programming » evaluating programming, evolution programming, variation programming
programming program » programming programmed, programming problem, programming problems
program computer » programs computer, program computers, program komputer
computer https » computers https, computing https, computer arts
interference evaluation » preference evaluation, interface evaluation, interference mitigation
evaluation programming » evaluating programming, evolution programming, variation programming
programming program » programming programmed, programming problem, programming problems
program computer » programs computer, program computers, program komputer
computer https » computers https, computing https, computer arts
1
2
Published 2010
Table of Contents:
“... -- Information Systems Security Criticality and Assurance Evaluation -- Security Analysis of ‘Two–Factor User...”View full text
Electronic
eBook
3
Published 2010
Table of Contents:
“... Without Prior Fault Data -- Models of Computation for Heterogeneous Embedded Systems -- A Quotient-Graph...”View full text
Electronic
eBook
4
Published 2008
Table of Contents:
“... Clients of Commodity Storage Servers -- Subscription Subsumption Evaluation for Content-Based Publish...”View full text
Electronic
eBook
5
Published 2012
Table of Contents:
“... Fault Injection Framework for Evaluating Multicore Systems -- Meeting Real-Time Requirements with Multi...”View full text
Electronic
eBook
6
Published 2015
Table of Contents:
“...Components as Location Graphs -- A Formal Approach to Autonomic Systems Programming: The SCEL...”View full text
Electronic
eBook
7
Published 2010
Table of Contents:
“... Choreographies -- Resolving Business Process Interference via Dynamic Reconfiguration -- Linked Data and Service...”View full text
Electronic
eBook
8
Published 2006
Table of Contents:
“... Interference -- Smart Instant Messenger in Pervasive Computing Environments -- Session 2: Grid Scheduling...”View full text
Electronic
eBook
9
Published 2005
Table of Contents:
“... of Situated Agents -- Evaluation of Agent–Oriented Software Methodologies – Examination of the Gap Between...”View full text
Electronic
eBook
10
Published 2010
Table of Contents:
“...-channel Interference Using Switched Parasitic Array Antenna in Femtocell Networks -- User Policy Based...”View full text
Electronic
eBook
11
Published 2010
Table of Contents:
“... -- Minimum CDS in Multihop Wireless Networks with Disparate Communication Ranges -- Minimum Edge Interference...”View full text
Electronic
eBook
12
Published 2012
Table of Contents:
“...Search Computing: Addressing Complex Search on the Web -- Hypergraph-Theoretic Partitioning Models...”View full text
Electronic
eBook
13
Published 2012
Table of Contents:
“... Minimization Problem -- Evaluating the Importance of Randomness in Search-Based Software Engineering -- Putting...”View full text
Electronic
eBook
14
Published 2014
Table of Contents:
“... Test Phase and Evaluation; S.Almuairfi, et al -- Coding DNA Sequence Watermarking; S.-H.Lee, et al...”View full text
Electronic
eBook
15
Published 2013
Table of Contents:
“... evaluation of TCP NewVegas and TCP Newreno on Burstification in an OBS Network -- Performance Enhancement...”View full text
Electronic
eBook
16
Published 2007
Table of Contents:
“... Performance of Subgradient Computational Techniques for Mesh Network Utility Optimization -- Channel Dependent...”View full text
Electronic
eBook
17
Published 2010
Table of Contents:
“... -- Multicast in Multi-channel Wireless Mesh Networks -- Ambient Interference Effects in Wi-Fi Networks -- A...”View full text
Electronic
eBook
18
Published 2010
Table of Contents:
“...Medium Access Control -- Physical Model Based Interference Classification and Analysis -- Dynamic...”View full text
Electronic
eBook
19
Published 2010
Table of Contents:
“... for Wireless Sensor Networks -- FDAN: Failure Detection Protocol for Mobile Ad Hoc Networks -- Interference...”View full text
Electronic
eBook
20
Published 2005
Table of Contents:
“... Privacy in Telecom Service Applications -- Network Security Management: A Formal Evaluation Tool Based...”View full text
Electronic
eBook



