Arama Sonuçları - ((\ chess composed ) OR (\ ((chess computer) OR ((threads OR threats) computer))\ ))*
Önerilen Konular
Önerilen Konular
- Data protection 27
- Telecommunication 27
- Data and Information Security 26
- Communications Engineering, Networks 25
- Computational Intelligence 24
- Computational intelligence 24
- Electronic Circuits and Systems 16
- Electronic circuits 16
- Security Science and Technology 16
- Security systems 16
- Artificial Intelligence 15
- Artificial intelligence 15
- Computer networks 11
- Signal processing 11
- Signal, Speech and Image Processing 11
- Computer Communication Networks 10
- Electronics 10
- Electronics and Microelectronics, Instrumentation 10
- Control engineering 9
- Automation 8
- Computer architecture 8
- Control, Robotics, Automation 8
- Microprocessors 8
- Processor Architectures 8
- Robotics 8
- History 7
- Application software 6
- Computer and Information Systems Applications 6
- Management 6
- Methodology 6
-
1
Mastering C++ multithreading : a comprehensive guide to developing effective multithreading applications in C++ /
Baskı/Yayın Bilgisi 2017Konular: Full-text access
OPAC'ta görüntüle
e-Kitap -
2
Emergent Computation A Festschrift for Selim G. Akl /
Baskı/Yayın Bilgisi 2017İçindekiler: “…All Twelve Prototypes Implement 1961 Lee algorithm -- Computer Chess Endgame Play with Pawns: Then and Now.- Community Detection Using Synthetic Coordinates and Flow Propagation.…”
Full-text access
OPAC'ta görüntüle
e-Kitap -
3
Information Security Practices Emerging Threats and Perspectives /
Baskı/Yayın Bilgisi 2017Full-text access
OPAC'ta görüntüle
e-Kitap -
4
Computer and Network Security Essentials
Baskı/Yayın Bilgisi 2018İçindekiler: “…Part I.COMPUTER SECURITY -- Chapter 1.Computer Security -- Chapter 2.A Survey and Taxonomy of Classifiers of Intrusion Detection Systems -- Chapter 3.A Technology for Detection of Advanced Persistent Threat in Networks and Systems Using a Finite Angular State Velocity Machine and Vector Mathematics -- Chapter 4.Information-theoretically Secure Privacy Preserving Approaches for Collaborative Association Rule Mining -- Chapter 5.A Postmortem Forensic Analysis for a JavaScript Based Attack -- Part II. …”
Full-text access
OPAC'ta görüntüle
e-Kitap -
5
Computer Simulation of Polymeric Materials Applications of the OCTA System /
Baskı/Yayın Bilgisi 2016Full-text access
OPAC'ta görüntüle
e-Kitap -
6
-
7
Soft Computing: Theories and Applications Proceedings of SoCTA 2016, Volume 2 /
Baskı/Yayın Bilgisi 2018İçindekiler: “…Virtual Experimental Analysis of Redundant Robot Manipulators using Neural Networks -- Selection of Energy Efficient Material: an Entropy-TOPSIS Approach -- Analyses & Detection of Health Insurance Fraud Using Data Mining & Predictive Modeling Techniques -- Software Cost Estimation Using Artificial Neural Network -- A Three Layer Approach for Overlay Text Extraction in Video Stream -- Recognition of Noisy Numbers Using Neural Network -- Secure Group Authentication Scheme for LTE-Advanced -- Frequency Fractal Behaviour in the Retina Nano Centre- Fed Dipole Antenna Network of a Human Eye -- Trigonometric Probability Tuning in Asynchronous Differential Evolution -- Analytical review on Image Compression using Fractal Image Coding -- The Fulcrum principle between Parasympathetic and Sympathetic peripheral systems: Auditory noise can modulate body's peripheral temperature -- Improved Clustering Algorithm for Wireless Sensor Network -- Fuzzy based probabilistic ecological risk assessment approach: Acase study of heavy metal contaminated soil -- Performance Comparisons of Four Modified Structures of Log Periodic Three Element Microstrip Antenna Arrays -- Preliminary Study of Ecommerce Adoption in Indian Handicraft SME: A Case Study -- Threat Detection for Software Vulnerability using DE based Adaptive Approach -- Methods to choose the 'Best-fit' Patch in Patch-Based Texture Synthesis Algorithm -- Revisiting Requirements Analysis Techniques and Challenges -- Speech Recognition with Combined MFCC, MODGDF and ZCPA Features Extraction techniques using NTN and MNTN conventional Classifiers for Telugu language -- Real Time Sentiment Analysis of Big Data Applications Using Twitter Data with Hadoop Framework -- Addressing Security concerns for Infrastructure of Cloud Computing.…”
Full-text access
OPAC'ta görüntüle
e-Kitap -
8
Secure System Design and Trustable Computing
Baskı/Yayın Bilgisi 2016Full-text access
OPAC'ta görüntüle
e-Kitap -
9
Recent Advances in Computational Intelligence in Defense and Security
Baskı/Yayın Bilgisi 2016Full-text access
OPAC'ta görüntüle
e-Kitap -
10
Security and Data Storage Aspect in Cloud Computing
Baskı/Yayın Bilgisi 2019Full-text access
OPAC'ta görüntüle
e-Kitap -
11
Cloud Computing and Big Data: Technologies, Applications and Security
Baskı/Yayın Bilgisi 2019İçindekiler: “…Elliptic Curve Qu-Vanstone based signcryption schemes with proxy re-encryption for secure cloud data storage -- Cloud Computing: Overview and Risk Identification Based on Classification by Type -- Authentication Model for Mobile Cloud Computing Database Service -- FADETPM: Novel Approach of File Assured Deletion Based on Trusted Platform Module -- Issues and Threats of Cloud Data Storage -- Challenges of Crowd Sensing for Cost-effective Data Management in the Cloud -- On the Security of Medical Image Processing in Cloud Environment -- Implementations of Intrusion Detection Architectures in Cloud Computing -- Privacy in Big Data Through Variable t-Closeness for MSN Attributes -- The Big Data-RTAP: Toward a Secured Video Surveillance System in Smart Environment -- Optimizations in Fully Homomorphic Encryption -- Support Cloud SLA establishment using MDE -- A New Parallel and Distributed Approach for Large Scale ImagesRetrieval -- Classification of Social Network Data Using a Dictionary-Based Approach -- Parallel and Distributed Map-Reduce Models for External Clustering Validation Indexes -- Workflow Scheduling Issues and Techniques in Cloud Computing: A Systematic Literature Review -- A Review of Green Cloud Computing Techniques -- Towards a smart exploitation of GPUs for low energy motion estimation using Full HD and 4K Videos -- Machine Learning applications in supply chains: Long Short-Term Memory for demand forecasting -- Performance Analysis of Preconditioned Conjugate Gradient Solver on Heterogeneous (Multi-CPUs/Multi-GPUs) Architecture -- Runtime prediction of optimizers using improved support vector machine -- AND/OR directed graph for dynamic web service composition -- An NLP based text-to-speech synthesizer for Moroccan Arabic -- Context-Aware Routing Protocol for Mobile WSN : Fire Forest Detection. .…”
Full-text access
OPAC'ta görüntüle
e-Kitap -
12
Transactions on Engineering Technologies World Congress on Engineering and Computer Science 2017 /
Baskı/Yayın Bilgisi 2019İçindekiler: “…Addressing the Challenges of IGBO Computational Morphological Studies Using Frequent Pattern-Based Induction -- 12. …”
Full-text access
OPAC'ta görüntüle
e-Kitap -
13
Cybernetics and Automation Control Theory Methods in Intelligent Algorithms Proceedings of 8th Computer Science On-line Conference 2019, Vol. 3 /
Baskı/Yayın Bilgisi 2019İçindekiler: “…Novel Filtering-based Approach using Fuzzy Logic for Prevention of Adversaries in Sensory Application -- Game-Decision Model for Isolating Intruder & bridging Tradeoff between Energy and Security -- Simplified Framework for Resisting Lethal Incoming Threats from Polluting in Wireless Sensor Network -- An Efficient Approach towards Formal Verification of Mixed Signals using Feed-Forward Neural Network -- PCCV: Parallel Cancellation and Convolution Viterbi encoding/decoding approach for MIMO-OFDMA for efficient resource allocation and power consumption -- Streaming Analytics - Real-time Customer Satisfaction in Brick-And-Mortar Retailing -- An Efficient Mechanism to Improve the Complexity and System Performance in OFDM using Switched Beam Smart Antenna -- Modeling the Engineering Process as a Thinging Machine: A Case Study of Chip Manufacturing -- A Simple and Cost-Effective Anomaly Detection Paradigm on the Basis of Computational Intelligence for Mobile Ad-hoc Networks from a Security Viewpoint -- A Technique of Adaptation of the Workload Distribution Problem Model for the Fog-Computing Environment.…”
Full-text access
OPAC'ta görüntüle
e-Kitap -
14
-
15
-
16
-
17
-
18
-
19
Security-Aware Design for Cyber-Physical Systems A Platform-Based Approach /
Baskı/Yayın Bilgisi 2017Full-text access
OPAC'ta görüntüle
e-Kitap -
20
Enabling the Internet of Things From Integrated Circuits to Integrated Systems /
Baskı/Yayın Bilgisi 2017Full-text access
OPAC'ta görüntüle
e-Kitap