Southville International School and Colleges
381. Surveillance Video Based Robust Detection and Notification of Real Time Suspicious Activities in Indoor Scenarios

by Shree, Nithya.

Type: book Book; Format: print ; Literary form: not fiction Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).

Actions: Add to cart
No cover image available
382. Testing and Improving Local Adaptive Importance Sampling in LFJ Local-JT in Multiply Sectioned Bayesian Networks

by Wu, Dan.

Type: book Book; Format: print ; Literary form: not fiction Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).

Actions: Add to cart
No cover image available
383. Using Mutation in Fault Localization

by Sun, Chenglong.

Type: book Book; Format: print ; Literary form: not fiction Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).

Actions: Add to cart
No cover image available
384. Vulnerabilities of the SSL/TLS Protocol

by Ćurguz, Jelena.

Type: book Book; Format: print ; Literary form: not fiction Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).

Actions: Add to cart
No cover image available
385. Weights Stagnation in Dynamic Local Search for SAT

by Ishtaiwi, Abderaouf.

Type: book Book; Format: print ; Literary form: not fiction Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).

Actions: Add to cart
No cover image available
386. A Proxy Signature Scheme Based on New Secure Authenticated Key Agreement Protocol

by Ekamchouchi, H.

Type: book Book; Format: print ; Literary form: not fiction Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).

Actions: Add to cart
No cover image available
387. A Secure Digital Signature Scheme with Fault Tolerance Based on The Improved RSA System

by Ekamchouchi, H.

Type: book Book; Format: print ; Literary form: not fiction Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).

Actions: Add to cart
No cover image available
388. Avoiding Duplicated Computation to Improve The Performance of PFSP on CUDA GPUs

by Wu, Chao-Chin.

Type: book Book; Format: print ; Literary form: not fiction Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).

Actions: Add to cart
No cover image available
389. Employees Characteristics in Knowledge Transfer and Performance

by Saide.

Type: book Book; Format: print ; Literary form: not fiction Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).

Actions: Add to cart
No cover image available
390. Improving Scheduling of Data Transmission in TDMA Systems

by Aslanidis, Timotheos.

Type: book Book; Format: print ; Literary form: not fiction Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).

Actions: Add to cart
No cover image available
391. Measuring Technological, Organizational and Environmental Factors Influencing the Adoption Intentions of Public Cloud Computing Using a Proposed Integrated Model

Type: book Book; Format: print ; Literary form: not fiction Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).

Actions: Add to cart
No cover image available
392. Usability Testing in Mobile Applications Involving People with Down Syndrome : A Literature Review

by Cáliz, Doris.

Type: book Book; Format: print ; Literary form: not fiction Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).

Actions: Add to cart
No cover image available
393. Application for Logical Expression Processing

by Michalak, Marcin.

Type: book Book; Format: print ; Literary form: not fiction Publisher: Computer Science and Information Technology ; June 2016Online Access: Click here to access online Availability: Copies available for loan: College Library (1).

Actions: Add to cart
No cover image available
394. Efficient Approach for Content Based Image Retrieval Using Multiple SVM in YACBIR

by Laib, Lakhdar.

Type: book Book; Format: print ; Literary form: not fiction Publisher: Computer Science and Information Technology ; June 2016Online Access: Click here to access online Availability: Copies available for loan: College Library (1).

Actions: Add to cart
No cover image available
395. Image Registration Using Advanced Topology Preserving Relaxation Labeling

by Kim, Chan-Il.

Type: book Book; Format: print ; Literary form: not fiction Publisher: Computer Science and Information Technology ; June 2016Online Access: Click here to access online Availability: Copies available for loan: College Library (1).

Actions: Add to cart
No cover image available
396. Medical Imaging Mutifractal Analysis in Prediction of Efficiency of Cancer Therapy

by Vasiljevic, Jelena.

Type: book Book; Format: print ; Literary form: not fiction Publisher: Computer Science and Information Technology ; June 2016Online Access: Click here to access online Availability: Copies available for loan: College Library (1).

Actions: Add to cart
No cover image available
397. Ontology Based Tele-Health Smart Home Care System : Ontosmart to Monitor Elderly

by Nachabe, L.

Type: book Book; Format: print ; Literary form: not fiction Publisher: Computer Science and Information Technology ; June 2016Online Access: Click here to access online Availability: Copies available for loan: College Library (1).

Actions: Add to cart
No cover image available
398. Turkish Sign Language Recognition Using Hidden Markov Model

by Kakayev, Kakajan.

Type: book Book; Format: print ; Literary form: not fiction Publisher: Computer Science and Information Technology ; June 2016Online Access: Click here to access online Availability: Copies available for loan: College Library (1).

Actions: Add to cart
No cover image available
399. A Survey on Security Risk Management Frameworks in Cloud Computing

by Alosaimi, Rana.

Type: book Book; Format: print ; Literary form: not fiction Publisher: Computer Science and Information Technology ; July 2016Online Access: Click here to access online Availability: Copies available for loan: College Library (1).

Actions: Add to cart
No cover image available
400. Analysis of CMOS and MTCMOS Circuits Using 250 Nano Meter Technology

by Suresh, M.

Type: book Book; Format: print ; Literary form: not fiction Publisher: Computer Science and Information Technology ; July 2016Online Access: Click here to access online Availability: Copies available for loan: College Library (1).

Actions: Add to cart
No cover image available
Powered by Koha