Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
attacking functionals » attaining functionals, attaining fuctionals, teaching functional
function attacking » functions attacking, function tracking, function making
functionals adding » functionality adding, functional coding, functional aging
parallel function » parallel functional, parallel auction, parallel union
adding https » aging https, auditing https, banking https
attacking functionals » attaining functionals, attaining fuctionals, teaching functional
function attacking » functions attacking, function tracking, function making
functionals adding » functionality adding, functional coding, functional aging
parallel function » parallel functional, parallel auction, parallel union
adding https » aging https, auditing https, banking https
1
Published 2005
Table of Contents:
“... Grid Service Chain Model -- A Performance-Based Parallel Loop Self-scheduling on Grid Computing...”View full text
Electronic
eBook
2
Published 2005
Table of Contents:
“... and Multicasting in Static Wireless Ad Hoc Networks -- An Algorithm for Nonconvex Lower Semicontinuous Optimization...”View full text
Electronic
eBook
3
Published 2008
Table of Contents:
“... and Solving Approaches -- Employing “Particle Swarm Optimization” and “Fuzzy Ranking Functions” for Direct...”View full text
Electronic
eBook
4
Published 2010
Table of Contents:
“... Networks -- Local Minima of a Quadratic Binary Functional with a Quasi-Hebbian Connection Matrix -- A...”View full text
Electronic
eBook
5
Published 2005
Table of Contents:
“... Approximation Algorithms for Metric Max TSP -- Unbalanced Graph Cuts -- Low Degree Connectivity in Ad-Hoc...”View full text
Electronic
eBook
6
Published 2014
Table of Contents:
“...: A Literature Survey -- Detection of Web Based Attacks by Analyzing Web Server Log Files -- A Survey...”View full text
Electronic
eBook
7
Published 2007
Table of Contents:
“... Graphic Reference Implementation for Embedded System -- Scheduling and Non Functional Properties -- A QoS...”View full text
Electronic
eBook
8
Published 2014
Table of Contents:
“... for Intelligent DoS Attack Targeting Firewalls -- A Practical Current Measurement Using Rogowski Coil and Haar...”View full text
Electronic
eBook
9
Published 2015
Table of Contents:
“... for Cognitive Radio Ad Hoc Networks; Z.Che-aron, et al -- Study of Sound and Haptic Feedback in Smart Wearable...”View full text
Electronic
eBook
10
Published 2007
Table of Contents:
“... Software Architecture for Shared Resource Management in Mobile Ad Hoc Networks -- Compressed Prefix Sums...”View full text
Electronic
eBook
11
Published 2013
Table of Contents:
“... Environment -- The Analysis of the Efficiency of Parallelization of Existing Serial Code on the Basis...”View full text
Electronic
eBook
12
Published 2010
Table of Contents:
“... Robots -- Protein Classification Based on 3D Structures and Fractal Features -- Protein Function...”View full text
Electronic
eBook
13
Published 2013
Table of Contents:
“... Industrial Robots -- A Combined Position Evaluation Function in Chinese Chess Computer Game -- Modeling...”View full text
Electronic
eBook
14
Published 2014
Table of Contents:
“... Scheme for Mobile Ad-Hoc Network -- Trust Based Network Layer Attacks Prevention in MANET -- Analysis...”View full text
Electronic
eBook
15
Published 2010
Table of Contents:
“...-embedding Algorithm: Digital Content Protection against Compression Attacks in Digital Watermarking...”View full text
Electronic
eBook
16
Published 2013
Table of Contents:
“... to Reliability Improvement with Model Checker -- DDoS attacks Defense System using Information Metrics -- CEAR...”View full text
Electronic
eBook
17
Published 2007
Table of Contents:
“... Power Consumptions of an IEEE 802.11 Multiple Rate Ad Hoc Network -- Energy Efficient Scheduling...”View full text
Electronic
eBook
18
Published 2015
Table of Contents:
“... Cognitive Radio Ad Hoc Networks -- 12. Theoretical Framework of the Algorithm to Thwart MAC Spoofing DoS...”View full text
Electronic
eBook
19
Published 2015
Table of Contents:
“... of Spoofed IP Packets -- 11. A Queueing Model for E-Learning System -- 12. Development of Common Parallel...”View full text
Electronic
eBook
20
Published 2014
Table of Contents:
“... Detection Algorithm for the Wormhole Attack in Ad Hoc Network -- Ad Hoc Eavesdropping Algorithm Based...”View full text
Electronic
eBook



