Podobne hasła w twoim wyszukiwaniu.
Podobne hasła w twoim wyszukiwaniu.
Inne możliwości wyszukiwania:
parallel microprocessor » parallel coprocessors, parallel processor, xscale microprocessor
functionality securing » functionality setting, functionality using, functionality testing
microprocessor data » microprocessor a, microprocessor based, microprocessor _
data functionality » paste functionality, data functional, its functionality
securing https » security https, security http, securing rtp
parallel microprocessor » parallel coprocessors, parallel processor, xscale microprocessor
functionality securing » functionality setting, functionality using, functionality testing
microprocessor data » microprocessor a, microprocessor based, microprocessor _
data functionality » paste functionality, data functional, its functionality
securing https » security https, security http, securing rtp
1
Wydane 2006
Spis treści:
“... Paper) -- An Operating System Design for the Security Architecture for Microprocessors -- Privacy...”Dokumenty pełnotekstowe
Elektroniczne
E-book
2
Wydane 2012
Spis treści:
“... for Web Server Protection against HTTP GET Flooding Attacks.- Privacy-Aware VANET Security: Putting Data...”Dokumenty pełnotekstowe
Elektroniczne
E-book
3
Wydane 2014
Spis treści:
“...Microcode Verification – Another Piece of the Microprocessor Verification Puzzle -- Are We...”Dokumenty pełnotekstowe
Elektroniczne
E-book
4
Wydane 2010
Spis treści:
“... -- SPOT: Optimization Tool for Network Adaptable Security -- On Authentication Method Impact upon Data...”Dokumenty pełnotekstowe
Elektroniczne
E-book
5
Wydane 2006
Spis treści:
“... for Coordinating Data-Parallel Programs (Position Statement) -- Implementations of Square-Root and Exponential...”Dokumenty pełnotekstowe
Elektroniczne
E-book
6
Wydane 2006
Spis treści:
“... Spaces with Massively Parallel Embedded Processors -- Efficient Automated Clock Gating Using CoDeL...”Dokumenty pełnotekstowe
Elektroniczne
E-book
7
Wydane 2007
Spis treści:
“... Measurements -- A Flexible General-Purpose Parallelizing Architecture for Nested Loops in Reconfigurable...”Dokumenty pełnotekstowe
Elektroniczne
E-book
8
Wydane 2006
Spis treści:
“... Security Architecture for Microprocessors (SAM) -- Distributed Networks -- Constraint-Based Deployment...”Dokumenty pełnotekstowe
Elektroniczne
E-book
9
Wydane 2013
Spis treści:
“...Wireless Sphygmomanometer with Data Encryption -- Design and Implementation of Multimedia Social...”Dokumenty pełnotekstowe
Elektroniczne
E-book



