Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
intrusions processing » extrusion processing, intrusion process, intrusion processes
internal intrusions » internal ingredients
processing program » processing programs, processing programmed, proceedings program
program constructs » program construction, program constructing, programming constructs
constructs https » construction https, constructs loops, constructs arti
intrusions processing » extrusion processing, intrusion process, intrusion processes
internal intrusions » internal ingredients
processing program » processing programs, processing programmed, proceedings program
program constructs » program construction, program constructing, programming constructs
constructs https » construction https, constructs loops, constructs arti
1
Published 2008
Table of Contents:
“... No One Can Hear You Scream: Evolving Fighting Creatures -- Real-Time, Non-intrusive Speech Quality...”View full text
Electronic
eBook
2
Published 2005
Table of Contents:
“... Sets Approach to Analysis of CUDT -- Intrusion Detection Based on Organizational Coevolutionary Fuzzy...”View full text
Electronic
eBook
3
Published 2006
Table of Contents:
“... -- Attribute Number Reduction Process and Nearest Neighbor Methods in Machine Learning -- The Use of Compound...”View full text
Electronic
eBook
4
Published 2005
Table of Contents:
“... -- Verifying Very Large Industrial Circuits Using 100 Processes and Beyond -- A New Reachability Algorithm...”View full text
Electronic
eBook
5
Published 2010
Table of Contents:
“... and Applications (DOA) International Conference 2010 -- DOA’10 - PC Co-chairs Message -- Data Storage...”View full text
Electronic
eBook
6
Published 2007
Table of Contents:
“... Process -- Rotation Invariant Texture Classification Using Gabor Wavelets -- Harmful Contents...”View full text
Electronic
eBook
7
Published 2005
Table of Contents:
“... Platform -- A Linear Time Algorithm for Constructing Tree 4-Spanner in 2-Trees -- Task Scheduling Algorithm...”View full text
Electronic
eBook
8
Published 2008
Table of Contents:
“... for Authentication -- An Escalated Approach to Ant Colony Clustering Algorithm for Intrusion Detection System...”View full text
Electronic
eBook
9
Published 2010
Table of Contents:
“... Random Fields and Their Application to Intrusion Detection -- Generalized Derivative Based Kernelized...”View full text
Electronic
eBook
10
Published 2010
Table of Contents:
“... Networks -- Heuristic Algorithms for Constructing Connected Dominating Sets with Minimum Size and Bounded...”View full text
Electronic
eBook
11
Published 2007
Table of Contents:
“... Sensitive Intrusion Detection -- An Empirical Study of the Impact of OCL Smells and Refactorings...”View full text
Electronic
eBook
12
Published 2010
Table of Contents:
“... Classification Rules with Gene Expression Programming: A Preliminary Study -- Solving Classification Problems...”View full text
Electronic
eBook
13
Published 2008
Table of Contents:
“... Cases -- Constructing a Safety Case for Automatically Generated Code from Formal Program Verification...”View full text
Electronic
eBook
14
Published 2005
Table of Contents:
“... for Intrusion Detection System -- A Study of Heuristic Techniques Inspired in Natural Process for the Solution...”View full text
Electronic
eBook
15
Published 2005
Table of Contents:
“... Evaluation of E-commerce and Process Improvement -- Application of Integrated Web Services-Based E-business...”View full text
Electronic
eBook
16
Published 2005
Table of Contents:
“... Mechanism for an Intrusion Tolerance System -- Protecting Online Rating Systems from Unfair Ratings...”View full text
Electronic
eBook
17
Published 2006
Table of Contents:
“... Processing -- Network Probabilistic Connectivity: Expectation of a Number of Disconnected Pairs of Nodes...”View full text
Electronic
eBook
18
Published 2010
Table of Contents:
“... Agenda -- Knowledge Intensive Business Processes: A Process-Technology Fit Perspective -- A Web Service...”View full text
Electronic
eBook
19
Published 2007
Table of Contents:
“... -- Text Classification with Support Vector Machine and Back Propagation Neural Network -- Construction...”View full text
Electronic
eBook
20
Published 2010
Table of Contents:
“... Techniques for Intrusion Detection of SQL-Based Attacks -- Efficiently Querying XML Documents Stored in RDBMS...”View full text
Electronic
eBook



