Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
processing programs » processing programmed, processing problems, processing products
method processing » metal processing, method process, methods preprocessing
programs security » program security, problems security, programs equity
interval method » internal methods, integral method, integral methods
https » http
processing programs » processing programmed, processing problems, processing products
method processing » metal processing, method process, methods preprocessing
programs security » program security, problems security, programs equity
interval method » internal methods, integral method, integral methods
https » http
1
Published 2006
Table of Contents:
“... and Verification -- A Method for Formalizing, Analyzing, and Verifying Secure User Interfaces -- Applying Timed...”View full text
Electronic
eBook
2
Published 2010
Table of Contents:
“... with Reduced Dimension Using Data Mining Classification Methods and Their Performance Comparison -- Recognition...”View full text
Electronic
eBook
3
Published 2010
Table of Contents:
“...Public Key Encryption -- On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption...”View full text
Electronic
eBook
4
Published 2010
Table of Contents:
“... -- Software Security in the Model for Service Oriented Architecture Quality -- Automatic Program...”View full text
Electronic
eBook
5
Published 2014
Table of Contents:
“... Method of Darknet Traffic for Advanced Security Monitoring and Response -- Detecting Malicious Spam Mails...”View full text
Electronic
eBook
6
Published 2006
Table of Contents:
“... Models for Audio-Visual Speech Analysis and Recognition -- An Extensive Method to Detect the Image...”View full text
Electronic
eBook
7
Published 2014
Table of Contents:
“... Method of Ranking for Intuitionistic Fuzzy Numbers -- Solution of Multi Objective Linear Programming...”View full text
Electronic
eBook
8
Published 2007
Table of Contents:
“... Process -- Rotation Invariant Texture Classification Using Gabor Wavelets -- Harmful Contents...”View full text
Electronic
eBook
9
Published 2005
Table of Contents:
“... Interactions -- Design of Neuro-fuzzy Controller Based on Dynamic Weights Updating -- Interval Computing...”View full text
Electronic
eBook
10
Published 2007
Table of Contents:
“...-objective Model Checking of Markov Decision Processes -- PReMo: An Analyzer for Probabilistic Recursive...”View full text
Electronic
eBook
11
Published 2005
Table of Contents:
“... Detection Technique for Mobile Adhoc Networks -- User Revocation in Secure Adhoc Networks -- A Hybrid Method...”View full text
Electronic
eBook
12
Published 2010
Table of Contents:
“... Model -- An Interval-based Method for Text Clustering -- A GVT Based Algorithm for Butterfly Barrier...”View full text
Electronic
eBook
13
Published 2007
Table of Contents:
“... Strategies in Markov Decision Processes -- Symmetries and the Complexity of Pure Nash Equilibrium -- Session...”View full text
Electronic
eBook
14
Subjects:
“...Probability Theory and Stochastic Processes. https://scigraph.springernature.com/ontologies/product...”
View full text
View full text
Electronic
eBook
15
Published 2015
Table of Contents:
“... Processing -- Full-Reference Image Quality Assessment Measure Based on Color Distortion -- Biomarker...”View full text
Electronic
eBook
16
Published 2010
Table of Contents:
“...Invited Papers -- Computational Intelligence and Image Processing Methods for Applications in Skin...”View full text
Electronic
eBook
17
Published 2005
Table of Contents:
“... Methods for Learning Click-Through Rates -- Experiments with an Economic Model of the Worldwide Web...”View full text
Electronic
eBook
18
Published 2007
Table of Contents:
“... Programming Classification Method -- Kimberlites Identification by Classification Methods -- A Fast Method...”View full text
Electronic
eBook
19
Published 2005
Table of Contents:
“... on Statistical Characteristics of Data -- Distribution Rules for Array Database Queries -- Efficient Processing...”View full text
Electronic
eBook
20
Published 2006
Table of Contents:
“...Watermarking Is Not Cryptography -- Secure Quantization Index Modulation Watermark Detection...”View full text
Electronic
eBook



