Search ResultsElectronic Resources
Limit Search Results
Author
Material Type
Language
Publication Date
-
Subject
Library
Shelf Location
39 Results Found Subscribe to search results
000000000000DEFAULT
Print
Select a list
Make this your default list.
The following items were successfully added.
    There was an error while adding the following items. Please try again.
      by 
      Hosseinian-Far, Amin. editor.
      Format: 
      Excerpt: 
      assessment and security to show how these ideas can be brought to bear on the modeling, analysis and design
      by 
      Bhatia, Sanjiv K. editor.
      Format: 
      Excerpt: 
      computing, security and many more. This book helps the perspective readers’ from computer industry and
      by 
      Zhang, Zhiming, author.
      Format: 
      Excerpt: 
      modification, and leak of confidential information. To address the security threats on FPGA systems, majority
      by 
      Sklavos, Nicolas. editor.
      Format: 
      Excerpt: 
      ) computer-aided design (CAD) tools that support security challenges, engineered for compliance with existing
      by 
      Abraham, Ajith. editor.
      Format: 
      Excerpt: 
      -based security schemes. Network managers, industry experts, academicians and practitioners alike (mostly in
      by 
      Rocha, Álvaro. editor.
      Format: 
      Excerpt: 
      ; Multimedia Systems and Applications; Computer Networks, Mobility and Pervasive Systems; Intelligent and
      by 
      Rocha, Álvaro. editor.
      Format: 
      Excerpt: 
      ; Multimedia Systems and Applications; Computer Networks, Mobility and Pervasive Systems; Intelligent and
      by 
      Rocha, Álvaro. editor.
      Format: 
      Excerpt: 
      ; Multimedia Systems and Applications; Computer Networks, Mobility and Pervasive Systems; Intelligent and
      by 
      Mitkowski, Wojciech. editor.
      Format: 
      Excerpt: 
      addresses applications. Part 5 discusses computer methods in control, and Part 6 examines fractional order
      by 
      Zohuri, Bahman. author.
      Format: 
      Excerpt: 
      . These enterprises include financial, organizational, homeland security, and supply chain operations with
      by 
      Lobiyal, Daya K. editor.
      Format: 
      Excerpt: 
      science and information security. The book aims to bring together the latest scientific research works of
      by 
      Raman, Balasubramanian. editor.
      Format: 
      Excerpt: 
      document processing are considered as applications of computer vision and image processing. They discuss