1
Published 2006
Table of Contents: ... and Verification -- A Method for Formalizing, Analyzing, and Verifying Secure User Interfaces -- Applying Timed...
View full text
Electronic eBook
2
Published 2010
Table of Contents: ... with Reduced Dimension Using Data Mining Classification Methods and Their Performance Comparison -- Recognition...
View full text
Electronic eBook
3
Published 2010
Table of Contents: ...Public Key Encryption -- On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption...
View full text
Electronic eBook
4
Published 2010
Table of Contents: ... -- Software Security in the Model for Service Oriented Architecture Quality -- Automatic Program...
View full text
Electronic eBook
5
Published 2014
Table of Contents: ... Method of Darknet Traffic for Advanced Security Monitoring and Response -- Detecting Malicious Spam Mails...
View full text
Electronic eBook
6
Published 2006
Table of Contents: ... Models for Audio-Visual Speech Analysis and Recognition -- An Extensive Method to Detect the Image...
View full text
Electronic eBook
7
Published 2014
Table of Contents: ... Method of Ranking for Intuitionistic Fuzzy Numbers -- Solution of Multi Objective Linear Programming...
View full text
Electronic eBook
8
Published 2007
Table of Contents: ... Process -- Rotation Invariant Texture Classification Using Gabor Wavelets -- Harmful Contents...
View full text
Electronic eBook
9
Published 2005
Table of Contents: ... Interactions -- Design of Neuro-fuzzy Controller Based on Dynamic Weights Updating -- Interval Computing...
View full text
Electronic eBook
10
Published 2007
Table of Contents: ...-objective Model Checking of Markov Decision Processes -- PReMo: An Analyzer for Probabilistic Recursive...
View full text
Electronic eBook
11
Published 2005
Table of Contents: ... Detection Technique for Mobile Adhoc Networks -- User Revocation in Secure Adhoc Networks -- A Hybrid Method...
View full text
Electronic eBook
12
Published 2010
Table of Contents: ... Model -- An Interval-based Method for Text Clustering -- A GVT Based Algorithm for Butterfly Barrier...
View full text
Electronic eBook
13
Published 2007
Table of Contents: ... Strategies in Markov Decision Processes -- Symmetries and the Complexity of Pure Nash Equilibrium -- Session...
View full text
Electronic eBook
14
Subjects: ...Probability Theory and Stochastic Processes. https://scigraph.springernature.com/ontologies/product...
View full text
Electronic eBook
15
Published 2015
Table of Contents: ... Processing -- Full-Reference Image Quality Assessment Measure Based on Color Distortion -- Biomarker...
View full text
Electronic eBook
16
Published 2010
Table of Contents: ...Invited Papers -- Computational Intelligence and Image Processing Methods for Applications in Skin...
View full text
Electronic eBook
17
Published 2005
Table of Contents: ... Methods for Learning Click-Through Rates -- Experiments with an Economic Model of the Worldwide Web...
View full text
Electronic eBook
18
Published 2007
Table of Contents: ... Programming Classification Method -- Kimberlites Identification by Classification Methods -- A Fast Method...
View full text
Electronic eBook
19
Published 2005
Table of Contents: ... on Statistical Characteristics of Data -- Distribution Rules for Array Database Queries -- Efficient Processing...
View full text
Electronic eBook
20
Published 2006
Table of Contents: ...Watermarking Is Not Cryptography -- Secure Quantization Index Modulation Watermark Detection...
View full text
Electronic eBook