|
|
381. |
Surveillance Video Based Robust Detection and Notification of Real Time Suspicious Activities in Indoor Scenarios
by Shree, Nithya.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
382. |
Testing and Improving Local Adaptive Importance Sampling in LFJ Local-JT in Multiply Sectioned Bayesian Networks
by Wu, Dan.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
383. |
Using Mutation in Fault Localization
by Sun, Chenglong.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
384. |
Vulnerabilities of the SSL/TLS Protocol
by Ćurguz, Jelena.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
385. |
Weights Stagnation in Dynamic Local Search for SAT
by Ishtaiwi, Abderaouf.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
386. |
A Proxy Signature Scheme Based on New Secure Authenticated Key Agreement Protocol
by Ekamchouchi, H.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
387. |
A Secure Digital Signature Scheme with Fault Tolerance Based on The Improved RSA System
by Ekamchouchi, H.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
388. |
Avoiding Duplicated Computation to Improve The Performance of PFSP on CUDA GPUs
by Wu, Chao-Chin.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
389. |
Employees Characteristics in Knowledge Transfer and Performance
by Saide.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
390. |
Improving Scheduling of Data Transmission in TDMA Systems
by Aslanidis, Timotheos.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
391. |
Measuring Technological, Organizational and Environmental Factors Influencing the Adoption Intentions of Public Cloud Computing Using a Proposed Integrated ModelType: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
392. |
Usability Testing in Mobile Applications Involving People with Down Syndrome : A Literature Review
by Cáliz, Doris.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
393. |
Application for Logical Expression Processing
by Michalak, Marcin.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; June 2016Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
394. |
Efficient Approach for Content Based Image Retrieval Using Multiple SVM in YACBIR
by Laib, Lakhdar.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; June 2016Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
395. |
Image Registration Using Advanced Topology Preserving Relaxation Labeling
by Kim, Chan-Il.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; June 2016Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
396. |
Medical Imaging Mutifractal Analysis in Prediction of Efficiency of Cancer Therapy
by Vasiljevic, Jelena.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; June 2016Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
397. |
Ontology Based Tele-Health Smart Home Care System : Ontosmart to Monitor Elderly
by Nachabe, L.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; June 2016Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
398. |
Turkish Sign Language Recognition Using Hidden Markov Model
by Kakayev, Kakajan.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; June 2016Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
399. |
A Survey on Security Risk Management Frameworks in Cloud Computing
by Alosaimi, Rana.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; July 2016Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
400. |
Analysis of CMOS and MTCMOS Circuits Using 250 Nano Meter Technology
by Suresh, M.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; July 2016Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|