Soggetti all'interno della tua ricerca.
Soggetti all'interno della tua ricerca.
Cerca anche:
functionality securing » functionality setting, functionality using, functionality testing
https functionality » its functionality, bags functionality, cross functionality
programs migration » programs simulation, programs extraction, programs education
securing https » security https, security http, securing rtp
functionality securing » functionality setting, functionality using, functionality testing
https functionality » its functionality, bags functionality, cross functionality
programs migration » programs simulation, programs extraction, programs education
securing https » security https, security http, securing rtp
1
Pubblicazione 2011
Sommario:
“... and defensive Mutualism: Moving Target Defense -- Manipulating Program Functionality to Eliminate Security...”Testo
Elettronico
eBook
2
Soggetti:
“...Software Engineering/Programming and Operating Systems. https://scigraph.springernature.com...”
Testo
Testo
Elettronico
eBook
3
Pubblicazione 2010
Sommario:
“... in Distributed Environments by Simultaneous Fragmentation and Allocation -- Parallel Architectures -- Function...”Testo
Elettronico
eBook
4
Pubblicazione 2010
Sommario:
“... -- Empirical Study on Migration Topologies and Migration Policies for Island Based Distributed Differential...”Testo
Elettronico
eBook
5
6
Sommario:
“... -- Deploying Group Policy -- Active Directory Security -- Managing Large-Scale Deployments -- Active Directory...”
Testo
Testo
Elettronico
eBook
7
Pubblicazione 2014
Sommario:
“... Spectrometry-Based Quantitative Approach Coupled with Biomedical Knowledge -- Online Migration Solver Based...”Testo
Elettronico
eBook
8
Pubblicazione 2007
Sommario:
“... Method Based on Received Signal Strength -- Optimization of the Switches in Storage Networks -- Migration...”Testo
Elettronico
eBook
9
Pubblicazione 2010
Sommario:
“...) -- Efficient Grid on the OTIS-Arrangment Network -- Single Thread Program Parallelism with Dataflow Abstracting...”Testo
Elettronico
eBook
10
Pubblicazione 2013
Sommario:
“...Customized Opinion Mining using Intelligent Algorithms -- Information Security Measurement Roles...”Testo
Elettronico
eBook
11
Pubblicazione 2007
Sommario:
“... Social Modeling and Simulation with Fuzzy Sets -- Stage-Dependent Fuzzy-valued Loss Function in Two-Stage...”Testo
Elettronico
eBook
12
Pubblicazione 2015
Sommario:
“... Extraction of Palm Vein Patterns Based on Two-Dimensional Density Function -- Segmentation Based Feature...”Testo
Elettronico
eBook
13
Pubblicazione 2010
Sommario:
“... and Generalisation: Footprints in Instance Space -- Adaptive Drift Analysis -- Optimizing Monotone Functions Can...”Testo
Elettronico
eBook
14
Pubblicazione 2015
Sommario:
“... for Classification of Welding Quality in RSW Systems -- Cross-Layer Secured IoT Network and Devices -- Inference...”Testo
Elettronico
eBook
15
Pubblicazione 2007
Sommario:
“... Home Agent Migration to Mobile IPv6 Based Protocols -- Experimental Evaluation of EAP Performance...”Testo
Elettronico
eBook
16
Pubblicazione 2015
Sommario:
“... Study on Various Attacks of TCP/IP and Security Challenges in MANET Layer Architecture -- SVD...”Testo
Elettronico
eBook
17
Pubblicazione 2015
Sommario:
“... Recognition Using Security Enhancement Model -- Enhancement of Power Transfer capability of HVDC Transmission...”Testo
Elettronico
eBook
18
Pubblicazione 2013
Sommario:
“... Services on Elgg -- On Migration and Consolidation of VMs in Hybrid CPU-GPU Environments -- A Case...”Testo
Elettronico
eBook



