Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality securing » functionality setting, functionality using, functionality testing
parallel programmes » parallel programs, parallel programming, parallel program
code functionality » cova functionality, more functionality, scale functionality
programmes code » programmers code, programmes rome, programmes de
securing https » security https, security http, securing rtp
functionality securing » functionality setting, functionality using, functionality testing
parallel programmes » parallel programs, parallel programming, parallel program
code functionality » cova functionality, more functionality, scale functionality
programmes code » programmers code, programmes rome, programmes de
securing https » security https, security http, securing rtp
1
Published 2005
Table of Contents:
“... Grid Service Chain Model -- A Performance-Based Parallel Loop Self-scheduling on Grid Computing...”View full text
Electronic
eBook
2
Published 2012
Table of Contents:
“... Hessian Curves -- Reduction-Centric Non-programmable Security Proof for the Full Domain Hash in the Random...”View full text
Electronic
eBook
3
Table of Contents:
“... -- Reconfigurable Logic Devices. Field-Programmable Gate Arrays. Coarse-Grained Reconfigurable Arrays. Summary...”
View full text
View full text
Electronic
eBook
4
Published 2007
Table of Contents:
“... -- Visualization of Five Erosion Risk Classes using Kernel Discriminants -- Computer Security and Safety...”View full text
Electronic
eBook
5
Published 2007
Table of Contents:
“... of Experts for View-Independent Face Recognition -- Fusion of Support Vector Classifiers for Parallel Gabor...”View full text
Electronic
eBook
6
Published 2015
Table of Contents:
“... -- Hierarchical Dynamic Power-Gating in FPGAs -- Tools and Compilers -- Hardware Synthesis from Functional...”View full text
Electronic
eBook
7
Published 2014
Table of Contents:
“... Polarization -- Experimental Study and Analysis of Security Threats in Compromised Networks -- A Weighted...”View full text
Electronic
eBook
8
Published 2013
Table of Contents:
“... -- Objective Function Design in Real-number-coding Genetic Algorithm for Laser-cutting Tool-path Minimization...”View full text
Electronic
eBook
9
Table of Contents:
“... -- Unmanaged Code Interoperability -- Commonly Used Interfaces and Patterns -- Windows Integration -- Parallel...”
View full text
View full text
Electronic
eBook



