|
|
81. |
Corrosion Detection Using A.I : A Comparison of Standard Computer Vision Techniques and Deep Learning Model
by Petricca, Luca.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
82. |
Effects of The Different Migration Periods on Parallel Multi-Swarm PSO
by Gülcü, Saban.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
83. |
Enhanced Protocol for Wireless Content-Centric Network
by Park, Chan-Min.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
84. |
Exploring Peer-To-Peer Data Mining
by Marcozzi, Andrea.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
85. |
Majority Voting Approach for the Identification of Differentially Expressed Genes to Understand Gender-Related Skeletal Muscle Aging
by Dreder, Abdouladeem.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
86. |
Management Architecture for Dynamic Federated Identity Management
by Pöhn, Daniela.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
87. |
Modified Vortex Search Algorithm for Real Parameter Optimization
by Dogˇan, Berat.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
88. |
Nonlinear Extension of Asymmetric Garch Model within Neural Network Framework
by Arnerić, Josip.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
89. |
Performance Evaluation of Trajectory Queries on Multiprocessor and Cluster
by Niyizamwiyitira, Christine.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
90. |
Projection Profile Based Number Plate Localization and Recognition
by Chowdhury, Sandipan.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
91. |
Semantic Analysis Over Lessons Learned Contained in Social Networks for Generating Organizational Memory in Centers R&D
by Javier, Marco.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
92. |
Smart as a Cryptographic Processor
by Kanchi, Saroja.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
93. |
Surveillance Video Based Robust Detection and Notification of Real Time Suspicious Activities in Indoor Scenarios
by Shree, Nithya.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
94. |
Testing and Improving Local Adaptive Importance Sampling in LFJ Local-JT in Multiply Sectioned Bayesian Networks
by Wu, Dan.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
95. |
Using Mutation in Fault Localization
by Sun, Chenglong.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
96. |
Vulnerabilities of the SSL/TLS Protocol
by Ćurguz, Jelena.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
97. |
Weights Stagnation in Dynamic Local Search for SAT
by Ishtaiwi, Abderaouf.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
98. |
A Proxy Signature Scheme Based on New Secure Authenticated Key Agreement Protocol
by Ekamchouchi, H.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
99. |
A Secure Digital Signature Scheme with Fault Tolerance Based on The Improved RSA System
by Ekamchouchi, H.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
100. |
Avoiding Duplicated Computation to Improve The Performance of PFSP on CUDA GPUs
by Wu, Chao-Chin.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|