Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality security » functionality securing, functional security, functionality usability
self functionality » cell functionality, scale functionality, s.g functionality
parallel function » parallel functional, parallel auction, parallel union
function self » functional self, function scf, function spef
https » http
functionality security » functionality securing, functional security, functionality usability
self functionality » cell functionality, scale functionality, s.g functionality
parallel function » parallel functional, parallel auction, parallel union
function self » functional self, function scf, function spef
https » http
1
Published 2005
Table of Contents:
“... Grid Service Chain Model -- A Performance-Based Parallel Loop Self-scheduling on Grid Computing...”View full text
Electronic
eBook
2
Published 2010
Table of Contents:
“...The 2010 International Symposium on Frontiers of Parallel and Distributed Computing (FPDC 2010...”View full text
Electronic
eBook
3
Published 2012
Table of Contents:
“...Security on LBlock against Biclique Cryptanalysis -- Improved Impossible Differential Attacks...”View full text
Electronic
eBook
4
Published 2006
Table of Contents:
“...Keynote Speech -- Data Mining for Security Applications -- Web and Text Mining for Terrorism...”View full text
Electronic
eBook
5
Published 2008
Table of Contents:
“... Behaviour -- Markov Chain Analysis of Genetic Algorithms Applied to Fitness Functions Perturbed by Multiple...”View full text
Electronic
eBook
6
Published 2006
Table of Contents:
“... Algorithm for Characteristic Points Evaluation in Static Images of Signatures -- Computer Security Systems...”View full text
Electronic
eBook
7
Published 2014
Table of Contents:
“... in Isabelle/HOL -- Verified Abstract Interpretation Techniques for Disassembling Low-level Self-modifying Code...”View full text
Electronic
eBook
8
Published 2008
Table of Contents:
“... of Trivium -- Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical...”View full text
Electronic
eBook
9
Published 2007
Table of Contents:
“...: Security and Efficiency -- Self-Generated-Certificate Public Key Encryption Without Pairing....”View full text
Electronic
eBook
10
Published 2006
Table of Contents:
“...Second Support Weights for Binary Self-dual Codes -- On Codes Correcting Symmetric Rank Errors...”View full text
Electronic
eBook
11
Published 2006
Table of Contents:
“... for Coordinating Data-Parallel Programs (Position Statement) -- Implementations of Square-Root and Exponential...”View full text
Electronic
eBook
12
Published 2010
Table of Contents:
“... for Software Quality -- Security Scheme for Managing a Large Quantity of Individual Information in RFID...”View full text
Electronic
eBook
13
Published 2015
Table of Contents:
“...Neural Networks and Their Applications -- Parallel approach to the Levenberg-Marquardt learning...”View full text
Electronic
eBook
14
Published 2010
Table of Contents:
“...Bridging Calculus and Statistics: Null - Hypotheses Underlain by Functional Equations...”View full text
Electronic
eBook
15
Published 2007
Table of Contents:
“... Decentralized Parallel I/O Scheduling Strategies for Parallel File Systems -- Distributed Security Constrained...”View full text
Electronic
eBook
16
Published 2015
Table of Contents:
“... in Computer Aided Design -- Software Framework for Modular Machine Learning Systems -- Parallel cost function...”View full text
Electronic
eBook
17
Published 2008
Table of Contents:
“... Encryption -- Taming of Pict -- Classification, Formalization and Verification of Security Functional...”View full text
Electronic
eBook
18
Published 2014
Table of Contents:
“... -- An Improved Adaptive Self-Organizing Map -- Usage of the TRACO Compiler for Neural Network Parallelization...”View full text
Electronic
eBook
19
Published 2007
Table of Contents:
“... in Multiple Care-of Addresses MIPv6 with Parallel Delay Measurement Technique -- Self-organization...”View full text
Electronic
eBook
20
Published 2013
Table of Contents:
“... Phenomenon Applied to a Self-adaptive Resources Selection Model -- Partial Imitation Hinders Emergence...”View full text
Electronic
eBook



