Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality function » functionals function, functionaries function, functional functions
parallel server » parallel servers, parallel series, parallel services
function https » functions https, fiction https
server adding » solver adding, server hacking, server sending
functionality function » functionals function, functionaries function, functional functions
parallel server » parallel servers, parallel series, parallel services
function https » functions https, fiction https
server adding » solver adding, server hacking, server sending
1
Published 2005
Table of Contents:
“... Grid Service Chain Model -- A Performance-Based Parallel Loop Self-scheduling on Grid Computing...”View full text
Electronic
eBook
2
Published 2005
Table of Contents:
“... Oriented Approach -- Kreios: Towards Semantic Interoperable Systems -- Adaptive Architecture for Web Server...”View full text
Electronic
eBook
3
Published 2010
Table of Contents:
“... Networks -- Local Minima of a Quadratic Binary Functional with a Quasi-Hebbian Connection Matrix -- A...”View full text
Electronic
eBook
4
Published 2014
Table of Contents:
“...: A Literature Survey -- Detection of Web Based Attacks by Analyzing Web Server Log Files -- A Survey...”View full text
Electronic
eBook
5
Published 2014
Table of Contents:
“... and Measurement Based on Morphological Functions in Graphical Vision Assistant Tool -- Efficient Algorithm...”View full text
Electronic
eBook
6
Published 2005
Table of Contents:
“... Configuration for QoS in Reliable Parallel Servers -- Session 2A: Practical Experience Reports and Tools I...”View full text
Electronic
eBook
7
Published 2013
Table of Contents:
“...-resistant Framework for Client/Server Intelligent Computing -- Effect of Forwarding Strategy on the Life...”View full text
Electronic
eBook
8
Published 2007
Table of Contents:
“... Power Consumptions of an IEEE 802.11 Multiple Rate Ad Hoc Network -- Energy Efficient Scheduling...”View full text
Electronic
eBook
9
Published 2014
Table of Contents:
“... Detection Algorithm for the Wormhole Attack in Ad Hoc Network -- Ad Hoc Eavesdropping Algorithm Based...”View full text
Electronic
eBook



