Search alternatives:
function attacking » functions attacking, function tracking, function making
attacking https » teaching https
https function » its function, sites function, ups function
1
Published 2010
Table of Contents: ... in Distributed Environments by Simultaneous Fragmentation and Allocation -- Parallel Architectures -- Function...
View full text
Electronic eBook
2
Published 2005
Table of Contents: ... Grid Service Chain Model -- A Performance-Based Parallel Loop Self-scheduling on Grid Computing...
View full text
Electronic eBook
3
Published 2010
Table of Contents: ... -- Coarse-Grained Loop Parallelization for Image Processing and Communication Applications -- SMAS...
View full text
Electronic eBook
4
Published 2015
Table of Contents: ... Study on Various Attacks of TCP/IP and Security Challenges in MANET Layer Architecture -- SVD...
View full text
Electronic eBook
5
Published 2015
Table of Contents: ... of Spoofed IP Packets -- 11. A Queueing Model for E-Learning System -- 12. Development of Common Parallel...
View full text
Electronic eBook
6
Published 2015
Table of Contents: ... Attack in Wireless Local Area Infrastructure Network -- 13. PCA Based Feature Selection for MRI Image...
View full text
Electronic eBook
7
Published 2013
Table of Contents: ...-operative Black Hole Attack in MANET -- IP Address Management in Virtualized Cloud Environments -- A Fuzzy C...
View full text
Electronic eBook
8
Published 2014
Table of Contents: ... -- On the Fekete-Szegö Problem for Certain Subclass of Analytic Functions -- Bi-Objective Scheduling on Parallel...
View full text
Electronic eBook
9
Published 2014
Table of Contents: ... for Intelligent DoS Attack Targeting Firewalls -- A Practical Current Measurement Using Rogowski Coil and Haar...
View full text
Electronic eBook
10
Published 2014
Table of Contents: ... and Morphology -- Video Watermarking Scheme Resistant to Rotation and Collusion Attacks -- Development...
View full text
Electronic eBook
11
Published 2007
Table of Contents: ... of Ideal and Empirical ROC-Based Reject Rules -- Outlier Detection with Kernel Density Functions -- Generic...
View full text
Electronic eBook
12
Published 2014
Table of Contents: ... in Traffic Accidents Occurred at the Road Intersection Based on Image Processing -- A Hybrid Method...
View full text
Electronic eBook
13
Published 2013
Table of Contents: ... Circuits -- Privacy Preserving Data Processing with Collaboration of Homomorphic -- Parallel Homomorphic...
View full text
Electronic eBook
14
Published 2013
Table of Contents: ...-Series Data -- Passwords -- “Give Me Letters 2, 3 and 6!”: Partial Password Implementations and Attacks...
View full text
Electronic eBook
15
Published 2007
Table of Contents: ... Model -- Enabling Very-Large Scale Earthquake Simulations on Parallel Machines -- Fast Insolation...
View full text
Electronic eBook
16
Published 2015
Table of Contents: ...Big and Smart Data -- A Parallel Approach for Decision Trees Learning from Big Data Streams...
View full text
Electronic eBook
17
Published 2014
Table of Contents: ...: A Literature Survey -- Detection of Web Based Attacks by Analyzing Web Server Log Files -- A Survey...
View full text
Electronic eBook
18
Published 2012
Table of Contents: ... Defense Against Insect Herbivore Attack -- Volatiles Mediating Information Between Bacteria and Plants...
View full text
Electronic eBook
19
Published 2015
Table of Contents: ... for Solar Hydrogen Generation Process -- Voltage regulation in Resonant Coupled Systems for Near Field Power...
View full text
Electronic eBook
20
Published 2005
Table of Contents: ... PTAS for Scheduling on Agreeable Unrelated Parallel Batch Processing Machines with Dynamic Job Arrivals...
View full text
Electronic eBook