A mostrar 1 - 20 resultados de 14,457 para a pesquisa '(( i a computer can non ) OR ((( d gelb comparing case non ) OR ( via early computed laws new ))))', tempo de pesquisa: 1.53seg Refinar resultados
5
Por Andre M. R. Wajong
Publicado em 2012-06-01
Assuntos: ...computer network, vurnerability, physical security, non physical security...
Obter o texto integral
Artigo
6
Por Complex (Conference), Zhou, Jie
Publicado em 2009
...Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications...
Obter o texto integral
Livro
7
... called i2APP that can efficiently identify APPs using a two-step machine learning (ML) framework. First...
Obter o texto integral
Artigo
9
Por Uplekar, M. W., Antia, N. H., Dhumale, P. S.
Publicado em 1988
... an evaluation of Sympmed I was carried out. The patients' symptoms were entered into the computer by a junior...
Obter o texto integral
Obter o texto integral
Artigo
15
..., non-volatile memory, flexible keyboard configuration-every key can be a special function key labeled...
Obter o texto integral
Artigo
17
Por Furnell, Steven M.
Publicado em 2005
.... ‘In today’s connected world no-one can afford to ignore computer security, this book tells you why, and what...
Obter o texto integral
Livro
19
... channel conditions can efficiently utilize resources. To this point, we propose an ML-based technique, i...
Obter o texto integral
Artigo