Search alternatives:
processing adding » processing auditing, processing using, processing among
strings computing » services computing, matrices computing
https strings » types strings
adding https » aging https, auditing https, banking https
1
Published 2013
Table of Contents: ... Engine Processors -- Query Processing in Highly-Loaded Search Engines -- Indexes for Jumbled Pattern...
View full text
Electronic eBook
2
Published 2011
Table of Contents: ...Introduction to the AdS/CFT Correspondence -- Perturbations of anti-de Sitter Black Holes...
View full text
Electronic eBook
3
Published 2007
Table of Contents: ... Algorithms -- A Lazy EDF Interrupt Scheduling Algorithm for Multiprocessor in Parallel Computing Environment...
View full text
Electronic eBook
4
Published 2005
Table of Contents: ...Keynote Speech -- Research Issues in Adapting Computing to Small Devices -- Mobile Context-Aware...
View full text
Electronic eBook
5
Published 2005
Table of Contents: ... -- Augmenting the Edge-Connectivity of a Spider Tree -- On Nash Equilibria for Multicast Transmissions in Ad-Hoc...
View full text
Electronic eBook
6
Published 2014
Table of Contents: ... and Collaboration Inducement in Mobile Ad hoc Networks -- Uncoupling of Mobile Cloud Computing Services...
View full text
Electronic eBook
7
Published 2007
Table of Contents: ... Using U-SAT -- A Collaborative Service Discovery and Service Sharing Framework for Mobile Ad Hoc...
View full text
Electronic eBook
8
Published 2006
Table of Contents: ... Computational Implementation of Internally Headed Relative Clause Constructions -- A Corpus-Based Empirical...
View full text
Electronic eBook
9
Published 2010
Table of Contents: ... Technique -- Configuration of Adaptive Models in Arithmetic Coding for Video Compression with 3DSPIHT -- Ad...
View full text
Electronic eBook
10
Published 2013
Table of Contents: ...-specific Characteristics -- The Application of Information Security on the Computer Terminals of 3rd...
View full text
Electronic eBook
11
Subjects: ...Quantum Field Theories, String Theory. https://scigraph.springernature.com/ontologies/product...
View full text
Electronic eBook
12
Published 2012
Table of Contents: ... Metadata Schema Generation for Chinese-Style Costume Digital Library -- Mobile and Cloud Computing Social...
View full text
Electronic eBook
13
Published 2005
Table of Contents: ... in Malicious Environment for Ad Hoc Networks -- Cryptographic Techniques I -- Short Linkable Ring Signatures...
View full text
Electronic eBook
14
Published 2015
Table of Contents: ... Rehabilitation Process; S.Salim, et al -- A Security Protocol based-on Mutual Authentication Application toward...
View full text
Electronic eBook
15
Published 2007
Table of Contents: ... in Distributed, Selfish Reallocation Processes with Weighted Tasks -- Finding Frequent Elements in Non-bursty...
View full text
Electronic eBook
16
Published 2010
Table of Contents: ... in the Near Future: A Technical and Social Review -- Object Oriented Approach in Computer Aided Process...
View full text
Electronic eBook
17
Subjects: ...Manufacturing, Machines, Tools, Processes. https://scigraph.springernature.com/ontologies/product...
View full text
Electronic eBook
18
Published 2006
Table of Contents: ... Information -- Ad-Hoc and Personal Ontologies: A Prototyping Approach to Ontology Engineering -- Relating...
View full text
Electronic eBook
19
Published 2015
Table of Contents: ... String Vibrations, by Almaz Sergaliyev, Julius Kaplunov, Lelya Khajiyeva -- Tuned Mass Damper Inverted...
View full text
Electronic eBook
20
by Boone, Keith W., Boone, Keith W.
Published 2011
Table of Contents: ... Quantities -- Summary -- 5 Text and Multimedia -- 5.1 BIN Binary -- 5.2 ED Encapsulated Data -- 5.3 ST String...
View full text
Electronic eBook