Rekommenderade teman
Rekommenderade teman
Menade du:
functionality securing » functionality setting, functionality using, functionality testing
program modification » program verification, programs verification, program certification
https functionality » its functionality, bags functionality, cross functionality
securing https » security https, security http, securing rtp
functionality securing » functionality setting, functionality using, functionality testing
program modification » program verification, programs verification, program certification
https functionality » its functionality, bags functionality, cross functionality
securing https » security https, security http, securing rtp
1
Ämnen:
“...Software Engineering/Programming and Operating Systems. https://scigraph.springernature.com...”
Hämta fulltext
Hämta fulltext
Elektronisk
E-bok
2
Innehållsförteckning:
“...Select -- Perform, Capture, and Track Data Modifications -- Transactions, Locking, Blocking...”
Hämta fulltext
Hämta fulltext
Elektronisk
E-bok
3
Publicerad 2010
Innehållsförteckning:
“...Bridging Calculus and Statistics: Null - Hypotheses Underlain by Functional Equations...”Hämta fulltext
Elektronisk
E-bok
4
Publicerad 2010
Innehållsförteckning:
“... of Matricellular Cues in Controlling Cell Functions -- Materials Surface Effects on Biological Interactions...”Hämta fulltext
Elektronisk
E-bok
5
Publicerad 2006
Innehållsförteckning:
“...Watermarking Is Not Cryptography -- Secure Quantization Index Modulation Watermark Detection...”Hämta fulltext
Elektronisk
E-bok
6
Publicerad 2005
Innehållsförteckning:
“... Modification of Planning Scheduler and Fuzzy Logic Control Law Response -- Integrated Tool for Testing Timed...”Hämta fulltext
Elektronisk
E-bok
7
Publicerad 2015
Innehållsförteckning:
“...: CIMMYT’s quest for combining genes to mitigate threats to global food security -- Part II Germplasm...”Hämta fulltext
Elektronisk
E-bok
8
Publicerad 2007
Innehållsförteckning:
“... with Content-Modification Operations -- Metamodeling the Quality of the Web Development Process’ Intermediate...”Hämta fulltext
Elektronisk
E-bok
9
Publicerad 2005
Innehållsförteckning:
“... -- Some Modifications of Bucket-Based Algorithms for Query Rewriting Using Views -- Data Mining...”Hämta fulltext
Elektronisk
E-bok
10
Publicerad 2005
Innehållsförteckning:
“... Security and an Application to File System Accesses -- Regular Papers -- A Machine Text-Inspired Machine...”Hämta fulltext
Elektronisk
E-bok
11
Publicerad 2012
Innehållsförteckning:
“... -- Simultaneous Learning of Several Bayesian and Mahalanobis Discriminant Functions by a Neural Network...”Hämta fulltext
Elektronisk
E-bok
12
Publicerad 2010
Innehållsförteckning:
“... and Generalisation: Footprints in Instance Space -- Adaptive Drift Analysis -- Optimizing Monotone Functions Can...”Hämta fulltext
Elektronisk
E-bok
13
Publicerad 2005
Innehållsförteckning:
“... Platform to Enhance Conventional Wheelchair, with Multiagent System Supervisory Control -- SECMAP: A Secure...”Hämta fulltext
Elektronisk
E-bok
14
Publicerad 2014
Innehållsförteckning:
“...SA-TCP: A Secure and Adaptive TCP for Wireless Ad Hoc Networks; W.S. Alnumay, et al -- IPAS: User...”Hämta fulltext
Elektronisk
E-bok



