Beruflich Dokumente
Kultur Dokumente
N
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27.
Year
2011/ Java 2011/ .Net 2011/ Java 2011/ .Net 2011/ Java 2011/ .Net 2011/ Java 2011/ .Net 2011/ Java 2011/ .Net 2011/ .Net 2011/ Java 2011/ .Net 2011/ .Net 2011/ Java 2011/ .Net 2011/ Java 2011/ Java 2011/ .Net 2011/ Java 2011/ .Net 2011/J2EE 2011/ .Net 2011/ .Net 2011/ .Net 2011/ Java 2011/ .Net
Domain
Networking Data Mining Networking Data Mining Networking Networking Networking Cloud Computing Networking Data Mining Data mining Networking Data mining Data Mining Network Security Secure Computing Network Network Data Mining Network Data Mining Data Mining Data Mining Data mining Data Mining Secure Computing Service
Computing 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50. 51. 52. One Size Does Not Fit All: Towards User- And Query-Dependent Ranking For Web Databases Nymble Blocking Misbehaving Users in Anonymizing Networks Data Integrity Proofs In Cloud Storage The World In A Nutshell: Concise Range Queries A Generic Multilevel Architecture For Time Series Prediction Intrusion detection: An Energy efficient approach in heterogeneous WSN NABS Novel Approaches for Biometric Systems A Machine Learning Approach For Identifying Disease-Treatment Relations In Short Texts A Fast Multiple Longest Common Subsequence (Mlcs) Algorithm A Fuzzy Self-Constructing Feature Clustering Algorithm For Text Classification A Link Analysis Extension Of Correspondence Analysis For Mining Relational Databases A Dual Framework And Algorithms For Targeted Online Data Delivery Adaptive Cluster Distance Bounding For High-Dimensional Indexing Dynamic Channel Allocation for Wireless Zone-Based Multicast and Broadcast Service Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks Clustering with Multi- View Point Based Similarity Measure Caching Strategies Based on Information Density Estimation in Wireless Ad Hoc Networks Going Back and Forth Efficient Multi deployment and Multi snap shutting on Clouds Secure and Practical Outsourcing of Linear Programming in Cloud Computing A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks A Unified Approach to Optimizing Performance in Networks Serving Heterogeneous Flows Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks Improving the Performance of Wireless Ad Hoc Networks Through MAC Layer Design Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks Throughput Optimization in High Speed Downlink Packet Access 2011/ .Net 2011/ Java 2011/ .Net 2011/ .Net 2011/ Java 2011/ .Net 2011/ .Net 2011/ Java 2011/ .Net 2011/ .Net 2011/ Java 2011/ Java 2011/ Java 2011/ Java 2011/ Java 2011/ Java Data mining Network Software Engineering Data mining Data mining Network Security Secure Computing Data mining Data mining Data mining Data mining Data mining Data mining Network Network Security Data mining Network 2011/ Java 2011/ Java 2011/ Java 2011/ Java 2011/ .Net 2011/ .Net 2011/ Java 2011/ Java Cloud Computing Cloud Computing Network Network Network Network Network Network