1
Published 2008
Table of Contents: ... No One Can Hear You Scream: Evolving Fighting Creatures -- Real-Time, Non-intrusive Speech Quality...
View full text
Electronic eBook
2
Published 2005
Table of Contents: ... Sets Approach to Analysis of CUDT -- Intrusion Detection Based on Organizational Coevolutionary Fuzzy...
View full text
Electronic eBook
3
Published 2006
Table of Contents: ... -- Attribute Number Reduction Process and Nearest Neighbor Methods in Machine Learning -- The Use of Compound...
View full text
Electronic eBook
4
Published 2005
Table of Contents: ... -- Verifying Very Large Industrial Circuits Using 100 Processes and Beyond -- A New Reachability Algorithm...
View full text
Electronic eBook
5
Published 2010
Table of Contents: ... and Applications (DOA) International Conference 2010 -- DOA’10 - PC Co-chairs Message -- Data Storage...
View full text
Electronic eBook
6
Published 2007
Table of Contents: ... Process -- Rotation Invariant Texture Classification Using Gabor Wavelets -- Harmful Contents...
View full text
Electronic eBook
7
Published 2005
Table of Contents: ... Platform -- A Linear Time Algorithm for Constructing Tree 4-Spanner in 2-Trees -- Task Scheduling Algorithm...
View full text
Electronic eBook
8
Published 2008
Table of Contents: ... for Authentication -- An Escalated Approach to Ant Colony Clustering Algorithm for Intrusion Detection System...
View full text
Electronic eBook
9
Published 2010
Table of Contents: ... Random Fields and Their Application to Intrusion Detection -- Generalized Derivative Based Kernelized...
View full text
Electronic eBook
10
Published 2010
Table of Contents: ... Networks -- Heuristic Algorithms for Constructing Connected Dominating Sets with Minimum Size and Bounded...
View full text
Electronic eBook
11
Published 2007
Table of Contents: ... Sensitive Intrusion Detection -- An Empirical Study of the Impact of OCL Smells and Refactorings...
View full text
Electronic eBook
12
Published 2010
Table of Contents: ... Classification Rules with Gene Expression Programming: A Preliminary Study -- Solving Classification Problems...
View full text
Electronic eBook
13
Published 2008
Table of Contents: ... Cases -- Constructing a Safety Case for Automatically Generated Code from Formal Program Verification...
View full text
Electronic eBook
14
Published 2005
Table of Contents: ... for Intrusion Detection System -- A Study of Heuristic Techniques Inspired in Natural Process for the Solution...
View full text
Electronic eBook
15
Published 2005
Table of Contents: ... Evaluation of E-commerce and Process Improvement -- Application of Integrated Web Services-Based E-business...
View full text
Electronic eBook
16
Published 2005
Table of Contents: ... Mechanism for an Intrusion Tolerance System -- Protecting Online Rating Systems from Unfair Ratings...
View full text
Electronic eBook
17
Published 2006
Table of Contents: ... Processing -- Network Probabilistic Connectivity: Expectation of a Number of Disconnected Pairs of Nodes...
View full text
Electronic eBook
18
Published 2010
Table of Contents: ... Agenda -- Knowledge Intensive Business Processes: A Process-Technology Fit Perspective -- A Web Service...
View full text
Electronic eBook
19
Published 2007
Table of Contents: ... -- Text Classification with Support Vector Machine and Back Propagation Neural Network -- Construction...
View full text
Electronic eBook
20
Published 2010
Table of Contents: ... Techniques for Intrusion Detection of SQL-Based Attacks -- Efficiently Querying XML Documents Stored in RDBMS...
View full text
Electronic eBook