Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
process detecting » processes detecting, processor detecting, process selecting
processing java » processing japan, processing james, processing j
detecting java » detecting data, dissecting java, detecting a
java process » java processor, data process, phva process
https » http
process detecting » processes detecting, processor detecting, process selecting
processing java » processing japan, processing james, processing j
detecting java » detecting data, dissecting java, detecting a
java process » java processor, data process, phva process
https » http
1
Table of Contents:
“... and Contours -- Corner Detection -- Detecting Simple Curves -- Morphological Filters -- Regions in Binary...”
View full text
View full text
Electronic
eBook
2
Published 2010
Table of Contents:
“... in the Future of Intelligent Information Processing -- Knowledge Mining Biological Network Models...”View full text
Electronic
eBook
3
Published 2005
Table of Contents:
“... Sets Approach to Analysis of CUDT -- Intrusion Detection Based on Organizational Coevolutionary Fuzzy...”View full text
Electronic
eBook
4
Published 2014
Table of Contents:
“...Speech Language Processing and Applications -- Automatically Recognising European Portuguese...”View full text
Electronic
eBook
5
Table of Contents:
“...Introduction -- Automatic Thresholding -- Filters for Color Images -- Edge Detection in Color...”
View full text
View full text
Electronic
eBook
6
Published 2010
Table of Contents:
“... of Distributed Java Programs -- A Delay-Based Dynamic Load Balancing Method and Its Stability Analysis...”View full text
Electronic
eBook
7
Published 2010
Table of Contents:
“...Third Workshop on Highly Parallel Processing on a Chip (HPPC 2009) -- HPPC 2009: 3rd Workshop...”View full text
Electronic
eBook
8
Published 2011
Table of Contents:
“...: Java-based Associative Memory -- Conversation Peculiarities of People with Different Verbal...”View full text
Electronic
eBook
9
Published 2013
Table of Contents:
“... -- Intrusion Detection in Zero Knowledge System Using Model Checking Approach -- Detecting Malicious users in P...”View full text
Electronic
eBook
10
Published 2005
Table of Contents:
“... Computing Using Free Load Profiles -- Active Link: Status Detection Mechanism for Distributed Service Based...”View full text
Electronic
eBook
11
Published 2014
Table of Contents:
“... and fault detection in the Software System: An Empirical Approach -- Software Coverage and Its Analysis...”View full text
Electronic
eBook
12
Published 2013
Table of Contents:
“... Encryption -- Proofs of Retrievability via Fountain Code -- MARC: Modified ARC4 -- Detection of HTTP-GET...”View full text
Electronic
eBook
13
Published 2005
Table of Contents:
“... for Interconnection Constrained Network of Heterogeneous Processors -- Neural Networks -- Detecting Topology...”View full text
Electronic
eBook
14
Published 2007
Table of Contents:
“... -- On Device-Based Identity Management in Enterprises -- Analysis-Level Classes from Secure Business Processes...”View full text
Electronic
eBook
15
Published 2007
Table of Contents:
“... -- Personalized E-Learning Process Using Effective Assessment and Feedback -- Optimally Pricing European Options...”View full text
Electronic
eBook
16
Published 2013
Table of Contents:
“...: A Java Type-2 Fuzzy Inference Systems Class Library for Building Object-Oriented Intelligent...”View full text
Electronic
eBook
17
Published 2008
Table of Contents:
“... for Detection of Windows PE Virus -- Using Genetic Algorithms for Parameter Optimization in Building Predictive...”View full text
Electronic
eBook
18
Published 2006
Table of Contents:
“... VRML and JAVA to Build Virtual Game-Based Learning Environment for Addition and Subtraction Operation...”View full text
Electronic
eBook
19
Published 2007
Table of Contents:
“...Keynote -- Security Issues for the Use of Semantic Web in E-Commerce -- Business Process Management...”View full text
Electronic
eBook
20
Published 2008
Table of Contents:
“... Symbolic Execution -- Static Detection of Place Locality and Elimination of Runtime Checks -- Certified...”View full text
Electronic
eBook



