Войти
Регистрация
Журналы
Издательства
Подписки
Войти
Регистрация
Научные статьи
\
Общие вопросы науки и культуры
\
Информационные технологии. Вычислительная техника. Обработка данных
Программные средства - 004.4
Научные статьи
В разделе "Программные средства"
Real Time Recognition of Handwritten Devnagari Signatures without Segmentation Using Artificial Neural Network
Video Analytics Algorithm for Automatic Vehicle Classification (Intelligent Transport System)
Application of PKI in Encrypting Communications and Verifying Identities of Users in the Internet Banking
Application of Digital Mockup Technology
Detecting Polymorphic Buffer Overflow Exploits with a Static Analysis Approach
A Group-oriented Access Control Scheme for P2P Networks
Research and Design of The Firewall Penetration Technology Serving to Informati on Sharing Systems
A Security Routing Protocol Protecting Mobile Agent Against Cluster Attack
A Comprhensive CBVR System Based on Spatiotemporal Features Such as Motion,Quantized Color and Edge Density Features
A Scalable Simulation Method for Network Attack
Compose Real-world Service With Context
The Study on Formal Verification of OS Kernel
Study on the Distribution of Networked Devices’ Clock Skew
Privacy Preserving Similarity Measurement
The Empirical Study on the Relationship between Knowledge Integration and IT Project Performance
An Improved Dynamic Probabilistic Packet Marking Algorithm
A Trust Evaluation Model for Industrial Control Ethernet Network
Design and Implementation of Anti-phishing Authentication System
Defending Against LDoS Attacks Using Fair AQM
Identifying Sentiment in Web Multi-topic Documents
Efficient Proxy Re-encryption with Private Searching in the Untrusted Cloud
Research on Diffusion Strategy About Resource Index of MP2P
The Comparison of Machine Learning Algorithms on Online Classification of Network Flows
A Multi-step Attack Recognition and Prediction Method Via Mining Attacks Conversion Frequencies
The Selective Forwarding Attack in Sensor Networks: Detections and Countermeasures
The Research and Application of Webpage Temper-proofing System
Two Noise Addition Methods For Privacy-Preserving Data Mining
A Data Flow Behavior Constraints Model for Branch Decision-making Variables
Research on Trustworthy Distributed System
The Study of Access Control for Service-Oriented Computing in Internet of Things
Securing Peer-to-Peer Distributions with Trusted Platform Modules
A New Secure Strategy for Small-Scale IEEE 802.11 Wireless Local Area Network
A Novel Method of Web Services Selection Based on Weighted Grey Relational Model in Ubiquitous Computing Environments
A modified semi-supervised color image segmentation method
Empirical Network Performance Evaluation of Security Protocols on Operating Systems
Keywords Review of IT Security Literature in Recent 20 Years
Crash Recovery for Embedded Main Memory Database
Dynamical Frequency Assignment of WSN Based on Cloud Computing Technology
New Downlink Scheduling Framework for Hybrid Unicast and Multicast Traffic in WiMAX Networks
Design and Simulation Implementation of an Improved PPM Approach
← Предыдущая
Следующая страница →
1
|
...
|
38
|
39
|
40
|
41
|
42
|
43
|
44
|
...
|
В конец
Нет соединения с интернетом.
Проверьте соединение и повторите попытку.