Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
function attacking » functions attacking, function tracking, function making
attacking https » teaching https
https function » its function, sites function, ups function
function attacking » functions attacking, function tracking, function making
attacking https » teaching https
https function » its function, sites function, ups function
1
Published 2010
Table of Contents:
“... in Distributed Environments by Simultaneous Fragmentation and Allocation -- Parallel Architectures -- Function...”View full text
Electronic
eBook
2
Published 2005
Table of Contents:
“... Grid Service Chain Model -- A Performance-Based Parallel Loop Self-scheduling on Grid Computing...”View full text
Electronic
eBook
3
Published 2010
Table of Contents:
“... -- Coarse-Grained Loop Parallelization for Image Processing and Communication Applications -- SMAS...”View full text
Electronic
eBook
4
Published 2015
Table of Contents:
“... Study on Various Attacks of TCP/IP and Security Challenges in MANET Layer Architecture -- SVD...”View full text
Electronic
eBook
5
Published 2015
Table of Contents:
“... of Spoofed IP Packets -- 11. A Queueing Model for E-Learning System -- 12. Development of Common Parallel...”View full text
Electronic
eBook
6
Published 2015
Table of Contents:
“... Attack in Wireless Local Area Infrastructure Network -- 13. PCA Based Feature Selection for MRI Image...”View full text
Electronic
eBook
7
Published 2013
Table of Contents:
“...-operative Black Hole Attack in MANET -- IP Address Management in Virtualized Cloud Environments -- A Fuzzy C...”View full text
Electronic
eBook
8
Published 2014
Table of Contents:
“... -- On the Fekete-Szegö Problem for Certain Subclass of Analytic Functions -- Bi-Objective Scheduling on Parallel...”View full text
Electronic
eBook
9
Published 2014
Table of Contents:
“... for Intelligent DoS Attack Targeting Firewalls -- A Practical Current Measurement Using Rogowski Coil and Haar...”View full text
Electronic
eBook
10
Published 2014
Table of Contents:
“... and Morphology -- Video Watermarking Scheme Resistant to Rotation and Collusion Attacks -- Development...”View full text
Electronic
eBook
11
Published 2007
Table of Contents:
“... of Ideal and Empirical ROC-Based Reject Rules -- Outlier Detection with Kernel Density Functions -- Generic...”View full text
Electronic
eBook
12
Published 2014
Table of Contents:
“... in Traffic Accidents Occurred at the Road Intersection Based on Image Processing -- A Hybrid Method...”View full text
Electronic
eBook
13
Published 2013
Table of Contents:
“... Circuits -- Privacy Preserving Data Processing with Collaboration of Homomorphic -- Parallel Homomorphic...”View full text
Electronic
eBook
14
Published 2013
Table of Contents:
“...-Series Data -- Passwords -- “Give Me Letters 2, 3 and 6!”: Partial Password Implementations and Attacks...”View full text
Electronic
eBook
15
Published 2007
Table of Contents:
“... Model -- Enabling Very-Large Scale Earthquake Simulations on Parallel Machines -- Fast Insolation...”View full text
Electronic
eBook
16
Published 2015
Table of Contents:
“...Big and Smart Data -- A Parallel Approach for Decision Trees Learning from Big Data Streams...”View full text
Electronic
eBook
17
Published 2014
Table of Contents:
“...: A Literature Survey -- Detection of Web Based Attacks by Analyzing Web Server Log Files -- A Survey...”View full text
Electronic
eBook
18
Published 2012
Table of Contents:
“... Defense Against Insect Herbivore Attack -- Volatiles Mediating Information Between Bacteria and Plants...”View full text
Electronic
eBook
19
Published 2015
Table of Contents:
“... for Solar Hydrogen Generation Process -- Voltage regulation in Resonant Coupled Systems for Near Field Power...”View full text
Electronic
eBook
20
Published 2005
Table of Contents:
“... PTAS for Scheduling on Agreeable Unrelated Parallel Batch Processing Machines with Dynamic Job Arrivals...”View full text
Electronic
eBook



