Search Results - ((( threads OR threats) computer ) OR (( hess OR ( less OR loss)) computer ))

Refine Results
  1. 1
  2. 2

    Emergent Computation A Festschrift for Selim G. Akl /

    Published 2017
    Table of Contents: “…-Structural Properties of the Generalized Exchanged Hypercubes.- Enumerated BSP Automata -- Coping with Silent Errors in HPC Applications.- Parallel Sorting For GPUs.- Mining for Functional Dependencies Using Shared Radix Trees in Many-Core Multi-Threaded Systems.- Cellular Automata and Wireless Sensor Networks.- Connectivity Preserving Network Transformers.- Operating Secure Mobile Healthcare Services over Constrained Resource Networks.- On Vague Computers.- Parallel evolutionary Optimization of Natural Convection Problem.- Theory and Practice of Discrete Interacting Agents Models.…”
    Full-text access
    View in OPAC
    e-Book
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    Transactions on Engineering Technologies World Congress on Engineering and Computer Science 2017 /

    Published 2019
    Table of Contents: “…Addressing the Challenges of IGBO Computational Morphological Studies Using Frequent Pattern-Based Induction -- 12. …”
    Full-text access
    View in OPAC
    e-Book
  10. 10
  11. 11
  12. 12
  13. 13

    Computer and Network Security Essentials

    Published 2018
    Table of Contents: “…Part I.COMPUTER SECURITY -- Chapter 1.Computer Security -- Chapter 2.A Survey and Taxonomy of Classifiers of Intrusion Detection Systems -- Chapter 3.A Technology for Detection of Advanced Persistent Threat in Networks and Systems Using a Finite Angular State Velocity Machine and Vector Mathematics -- Chapter 4.Information-theoretically Secure Privacy Preserving Approaches for Collaborative Association Rule Mining -- Chapter 5.A Postmortem Forensic Analysis for a JavaScript Based Attack -- Part II. …”
    Full-text access
    View in OPAC
    e-Book
  14. 14

    Soft Computing Applications

    Published 2018
    Table of Contents: “…A Brain like Computer Made of Time crystal: Could a Metric of Prime alone Replace a User and Alleviate Programming Forever? …”
    Full-text access
    View in OPAC
    e-Book
  15. 15
  16. 16

    Dense Image Correspondences for Computer Vision

    Published 2016
    Full-text access
    View in OPAC
    e-Book
  17. 17
  18. 18
  19. 19

    Soft Computing: Theories and Applications Proceedings of SoCTA 2016, Volume 2 /

    Published 2018
    Table of Contents: “…Virtual Experimental Analysis of Redundant Robot Manipulators using Neural Networks -- Selection of Energy Efficient Material: an Entropy-TOPSIS Approach -- Analyses & Detection of Health Insurance Fraud Using Data Mining & Predictive Modeling Techniques -- Software Cost Estimation Using Artificial Neural Network -- A Three Layer Approach for Overlay Text Extraction in Video Stream -- Recognition of Noisy Numbers Using Neural Network -- Secure Group Authentication Scheme for LTE-Advanced -- Frequency Fractal Behaviour in the Retina Nano Centre- Fed Dipole Antenna Network of a Human Eye -- Trigonometric Probability Tuning in Asynchronous Differential Evolution -- Analytical review on Image Compression using Fractal Image Coding -- The Fulcrum principle between Parasympathetic and Sympathetic peripheral systems: Auditory noise can modulate body's peripheral temperature -- Improved Clustering Algorithm for Wireless Sensor Network -- Fuzzy based probabilistic ecological risk assessment approach: Acase study of heavy metal contaminated soil -- Performance Comparisons of Four Modified Structures of Log Periodic Three Element Microstrip Antenna Arrays -- Preliminary Study of Ecommerce Adoption in Indian Handicraft SME: A Case Study -- Threat Detection for Software Vulnerability using DE based Adaptive Approach -- Methods to choose the 'Best-fit' Patch in Patch-Based Texture Synthesis Algorithm -- Revisiting Requirements Analysis Techniques and Challenges -- Speech Recognition with Combined MFCC, MODGDF and ZCPA Features Extraction techniques using NTN and MNTN conventional Classifiers for Telugu language -- Real Time Sentiment Analysis of Big Data Applications Using Twitter Data with Hadoop Framework -- Addressing Security concerns for Infrastructure of Cloud Computing.…”
    Full-text access
    View in OPAC
    e-Book
  20. 20