Arama Sonuçları - ((( threads OR threats) computer ) OR (( hess OR ( less OR loss)) computer ))
Önerilen Konular
Önerilen Konular
- Computational Intelligence 72
- Computational intelligence 72
- Telecommunication 64
- Communications Engineering, Networks 55
- Artificial Intelligence 45
- Artificial intelligence 45
- Control engineering 37
- Electronic Circuits and Systems 32
- Electronic circuits 32
- Signal processing 32
- Signal, Speech and Image Processing 32
- Data protection 31
- Data and Information Security 30
- Electronics 26
- Electronics and Microelectronics, Instrumentation 26
- Mechanics, Applied 26
- Security Science and Technology 26
- Security systems 26
- Control and Systems Theory 21
- Electric power production 19
- Electrical Power Engineering 19
- Automation 17
- Computer networks 17
- Control, Robotics, Automation 17
- Machines, Tools, Processes 17
- Manufactures 17
- Materials 17
- Robotics 17
- Computer Communication Networks 16
- Microwaves, RF Engineering and Optical Communications 16
-
1
Mastering C++ multithreading : a comprehensive guide to developing effective multithreading applications in C++ /
Baskı/Yayın Bilgisi 2017Konular: Full-text access
OPAC'ta görüntüle
e-Kitap -
2
Emergent Computation A Festschrift for Selim G. Akl /
Baskı/Yayın Bilgisi 2017İçindekiler: “…-Structural Properties of the Generalized Exchanged Hypercubes.- Enumerated BSP Automata -- Coping with Silent Errors in HPC Applications.- Parallel Sorting For GPUs.- Mining for Functional Dependencies Using Shared Radix Trees in Many-Core Multi-Threaded Systems.- Cellular Automata and Wireless Sensor Networks.- Connectivity Preserving Network Transformers.- Operating Secure Mobile Healthcare Services over Constrained Resource Networks.- On Vague Computers.- Parallel evolutionary Optimization of Natural Convection Problem.- Theory and Practice of Discrete Interacting Agents Models.…”
Full-text access
OPAC'ta görüntüle
e-Kitap -
3
Information Security Practices Emerging Threats and Perspectives /
Baskı/Yayın Bilgisi 2017Full-text access
OPAC'ta görüntüle
e-Kitap -
4
Manipulation of Multiphase Materials for Touch-less Nanobiotechnology A Pyrofluidic Platform /
Baskı/Yayın Bilgisi 2016Full-text access
OPAC'ta görüntüle
e-Kitap -
5
Information Loss in Deterministic Signal Processing Systems
Baskı/Yayın Bilgisi 2018Full-text access
OPAC'ta görüntüle
e-Kitap -
6
Handbook of Contact Mechanics Exact Solutions of Axisymmetric Contact Problems /
Baskı/Yayın Bilgisi 2019Full-text access
OPAC'ta görüntüle
e-Kitap -
7
Estimation and Control for Networked Systems with Packet Losses without Acknowledgement
Baskı/Yayın Bilgisi 2017Full-text access
OPAC'ta görüntüle
e-Kitap -
8
Electrochemical Biosensor: Point-of-Care for Early Detection of Bone Loss
Baskı/Yayın Bilgisi 2019Full-text access
OPAC'ta görüntüle
e-Kitap -
9
Transactions on Engineering Technologies World Congress on Engineering and Computer Science 2017 /
Baskı/Yayın Bilgisi 2019İçindekiler: “…Addressing the Challenges of IGBO Computational Morphological Studies Using Frequent Pattern-Based Induction -- 12. …”
Full-text access
OPAC'ta görüntüle
e-Kitap -
10
Music and death : interdisciplinary readings and perspectives /
Baskı/Yayın Bilgisi 2019Full-text access
OPAC'ta görüntüle
e-Kitap -
11
Advanced Engineering Mathematics
Baskı/Yayın Bilgisi 2019Full-text access
OPAC'ta görüntüle
e-Kitap -
12
Parental grief and photographic remembrance : a historical account of undying love /
Baskı/Yayın Bilgisi 2020Full-text access
OPAC'ta görüntüle
e-Kitap -
13
Computer and Network Security Essentials
Baskı/Yayın Bilgisi 2018İçindekiler: “…Part I.COMPUTER SECURITY -- Chapter 1.Computer Security -- Chapter 2.A Survey and Taxonomy of Classifiers of Intrusion Detection Systems -- Chapter 3.A Technology for Detection of Advanced Persistent Threat in Networks and Systems Using a Finite Angular State Velocity Machine and Vector Mathematics -- Chapter 4.Information-theoretically Secure Privacy Preserving Approaches for Collaborative Association Rule Mining -- Chapter 5.A Postmortem Forensic Analysis for a JavaScript Based Attack -- Part II. …”
Full-text access
OPAC'ta görüntüle
e-Kitap -
14
Soft Computing Applications
Baskı/Yayın Bilgisi 2018İçindekiler: “…A Brain like Computer Made of Time crystal: Could a Metric of Prime alone Replace a User and Alleviate Programming Forever? …”
Full-text access
OPAC'ta görüntüle
e-Kitap -
15
Energy Limits in Computation A Review of Landauer's Principle, Theory and Experiments /
Baskı/Yayın Bilgisi 2019Full-text access
OPAC'ta görüntüle
e-Kitap -
16
Dense Image Correspondences for Computer Vision
Baskı/Yayın Bilgisi 2016Full-text access
OPAC'ta görüntüle
e-Kitap -
17
Computer Simulation of Polymeric Materials Applications of the OCTA System /
Baskı/Yayın Bilgisi 2016Full-text access
OPAC'ta görüntüle
e-Kitap -
18
-
19
Soft Computing: Theories and Applications Proceedings of SoCTA 2016, Volume 2 /
Baskı/Yayın Bilgisi 2018İçindekiler: “…Virtual Experimental Analysis of Redundant Robot Manipulators using Neural Networks -- Selection of Energy Efficient Material: an Entropy-TOPSIS Approach -- Analyses & Detection of Health Insurance Fraud Using Data Mining & Predictive Modeling Techniques -- Software Cost Estimation Using Artificial Neural Network -- A Three Layer Approach for Overlay Text Extraction in Video Stream -- Recognition of Noisy Numbers Using Neural Network -- Secure Group Authentication Scheme for LTE-Advanced -- Frequency Fractal Behaviour in the Retina Nano Centre- Fed Dipole Antenna Network of a Human Eye -- Trigonometric Probability Tuning in Asynchronous Differential Evolution -- Analytical review on Image Compression using Fractal Image Coding -- The Fulcrum principle between Parasympathetic and Sympathetic peripheral systems: Auditory noise can modulate body's peripheral temperature -- Improved Clustering Algorithm for Wireless Sensor Network -- Fuzzy based probabilistic ecological risk assessment approach: Acase study of heavy metal contaminated soil -- Performance Comparisons of Four Modified Structures of Log Periodic Three Element Microstrip Antenna Arrays -- Preliminary Study of Ecommerce Adoption in Indian Handicraft SME: A Case Study -- Threat Detection for Software Vulnerability using DE based Adaptive Approach -- Methods to choose the 'Best-fit' Patch in Patch-Based Texture Synthesis Algorithm -- Revisiting Requirements Analysis Techniques and Challenges -- Speech Recognition with Combined MFCC, MODGDF and ZCPA Features Extraction techniques using NTN and MNTN conventional Classifiers for Telugu language -- Real Time Sentiment Analysis of Big Data Applications Using Twitter Data with Hadoop Framework -- Addressing Security concerns for Infrastructure of Cloud Computing.…”
Full-text access
OPAC'ta görüntüle
e-Kitap -
20