skip to main content
Language:
Search Limited to: Search Limited to: Resource type Show Results with: Show Results with: Search type Index

Results 1 - 20 of 72  for All Library Resources

Results 1 2 3 4 next page
Show only
Refined by: resource type: Book Chapters remove xxx: xxx remove
Result Number Material Type Add to My Shelf Action Record Details and Options
1
XXX
Material Type:
Book Chapter
Add to My Research

XXX

Artists' SoHo: 49 Episodes of Intimate History, 2015, p.174

2015 Richard Kostelanetz ;ISBN: 9780823262823 ;ISBN: 0823262820 ;EISBN: 9780823262854 ;EISBN: 0823262855

Full text available

2
Data Governance and Transparency for Collaborative Systems
Material Type:
Book Chapter
Add to My Research

Data Governance and Transparency for Collaborative Systems

Lecture Notes in Computer Science, 2016, Vol.LNCS-9766, p.199-216 [Peer Reviewed Journal]

Attribution ;DOI: 10.1007/978-3-319-41483-6_15

Digital Resources/Online E-Resources

3
Practical Differentially Private Modeling of Human Movement Data
Material Type:
Book Chapter
Add to My Research

Practical Differentially Private Modeling of Human Movement Data

Lecture Notes in Computer Science, 2016, Vol.LNCS-9766, p.170-178 [Peer Reviewed Journal]

Attribution ;DOI: 10.1007/978-3-319-41483-6_13

Digital Resources/Online E-Resources

4
A Tour in Process Mining: From Practice to Algorithmic Challenges
Material Type:
Book Chapter
Add to My Research

A Tour in Process Mining: From Practice to Algorithmic Challenges

LNCS Transactions on Petri Nets and Other Models of Concurrency, 2019 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1867-7193 ;DOI: 10.1007/978-3-662-60651-3_1

Digital Resources/Online E-Resources

5
Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks
Material Type:
Book Chapter
Add to My Research

Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks

Lecture Notes in Computer Science, 2016, Vol.LNCS-9766, p.295-312 [Peer Reviewed Journal]

Attribution ;DOI: 10.1007/978-3-319-41483-6_21

Digital Resources/Online E-Resources

6
Counteracting Active Attacks in Social Network Graphs
Material Type:
Book Chapter
Add to My Research

Counteracting Active Attacks in Social Network Graphs

Lecture Notes in Computer Science, 2016, Vol.LNCS-9766, p.233-248 [Peer Reviewed Journal]

Attribution ;DOI: 10.1007/978-3-319-41483-6_17

Digital Resources/Online E-Resources

7
Mining Hierarchical Temporal Roles with Multiple Metrics
Material Type:
Book Chapter
Add to My Research

Mining Hierarchical Temporal Roles with Multiple Metrics

Lecture Notes in Computer Science, 2016, Vol.LNCS-9766, p.79-95 [Peer Reviewed Journal]

Attribution ;DOI: 10.1007/978-3-319-41483-6_6

Digital Resources/Online E-Resources

8
Runtime Detection of Zero-Day Vulnerability Exploits in Contemporary Software Systems
Material Type:
Book Chapter
Add to My Research

Runtime Detection of Zero-Day Vulnerability Exploits in Contemporary Software Systems

Lecture Notes in Computer Science, 2016, Vol.LNCS-9766, p.347-363 [Peer Reviewed Journal]

Attribution ;DOI: 10.1007/978-3-319-41483-6_24

Digital Resources/Online E-Resources

9
Deciphering Text from Touchscreen Key Taps
Material Type:
Book Chapter
Add to My Research

Deciphering Text from Touchscreen Key Taps

Lecture Notes in Computer Science, 2016, Vol.LNCS-9766, p.3-18 [Peer Reviewed Journal]

Attribution ;DOI: 10.1007/978-3-319-41483-6_1

Digital Resources/Online E-Resources

10
CheapSMC: A Framework to Minimize Secure Multiparty Computation Cost in the Cloud
Material Type:
Book Chapter
Add to My Research

CheapSMC: A Framework to Minimize Secure Multiparty Computation Cost in the Cloud

Lecture Notes in Computer Science, 2016, Vol.LNCS-9766, p.285-294 [Peer Reviewed Journal]

Attribution ;DOI: 10.1007/978-3-319-41483-6_20

Digital Resources/Online E-Resources

11
Formalizing Threat Models for Virtualized Systems
Material Type:
Book Chapter
Add to My Research

Formalizing Threat Models for Virtualized Systems

Lecture Notes in Computer Science, 2016, Vol.LNCS-9766, p.251-267 [Peer Reviewed Journal]

Attribution ;DOI: 10.1007/978-3-319-41483-6_18

Digital Resources/Online E-Resources

12
Access Control for the Shuffle Index
Material Type:
Book Chapter
Add to My Research

Access Control for the Shuffle Index

Lecture Notes in Computer Science, 2016, Vol.LNCS-9766, p.130-147 [Peer Reviewed Journal]

Attribution ;DOI: 10.1007/978-3-319-41483-6_10

Digital Resources/Online E-Resources

13
Reasoning About Firewall Policies Through Refinement and Composition
Material Type:
Book Chapter
Add to My Research

Reasoning About Firewall Policies Through Refinement and Composition

Lecture Notes in Computer Science, 2016, Vol.LNCS-9766, p.268-284 [Peer Reviewed Journal]

Attribution ;DOI: 10.1007/978-3-319-41483-6_19

Digital Resources/Online E-Resources

14
A Practical Framework for Executing Complex Queries over Encrypted Multimedia Data
Material Type:
Book Chapter
Add to My Research

A Practical Framework for Executing Complex Queries over Encrypted Multimedia Data

Lecture Notes in Computer Science, 2016, Vol.LNCS-9766, p.179-195 [Peer Reviewed Journal]

Attribution ;DOI: 10.1007/978-3-319-41483-6_14

Digital Resources/Online E-Resources

15
Privacy Preserving Probabilistic Record Linkage Using Locality Sensitive Hashes
Material Type:
Book Chapter
Add to My Research

Privacy Preserving Probabilistic Record Linkage Using Locality Sensitive Hashes

Lecture Notes in Computer Science, 2016, Vol.LNCS-9766, p.61-76 [Peer Reviewed Journal]

Attribution ;DOI: 10.1007/978-3-319-41483-6_5

Digital Resources/Online E-Resources

16
Guaranteeing Correctness of Bulk Operations in Outsourced Databases
Material Type:
Book Chapter
Add to My Research

Guaranteeing Correctness of Bulk Operations in Outsourced Databases

Lecture Notes in Computer Science, 2016, Vol.LNCS-9766, p.37-51 [Peer Reviewed Journal]

Attribution ;DOI: 10.1007/978-3-319-41483-6_3

Digital Resources/Online E-Resources

17
Towards Creating Believable Decoy Project Folders for Detecting Data Theft
Material Type:
Book Chapter
Add to My Research

Towards Creating Believable Decoy Project Folders for Detecting Data Theft

Lecture Notes in Computer Science, 2016, Vol.LNCS-9766, p.161-169 [Peer Reviewed Journal]

Attribution ;DOI: 10.1007/978-3-319-41483-6_12

Digital Resources/Online E-Resources

18
Computational Identification of -1 Frameshift Signals
Material Type:
Book Chapter
Add to My Research

Computational Identification of -1 Frameshift Signals

Computational Science - ICCS 2004, p.334-341 [Peer Reviewed Journal]

Springer-Verlag Berlin Heidelberg 2004 ;ISSN: 0302-9743 ;ISBN: 354022114X ;ISBN: 9783540221142 ;EISSN: 1611-3349 ;EISBN: 3540246851 ;EISBN: 9783540246855 ;DOI: 10.1007/978-3-540-24685-5_42

Full text available

19
On the reconstruction of finite lattice sets from their X-rays
Material Type:
Book Chapter
Add to My Research

On the reconstruction of finite lattice sets from their X-rays

Discrete Geometry for Computer Imagery, 2005, p.19-32 [Peer Reviewed Journal]

Springer-Verlag Berlin Heidelberg 1997 ;1998 INIST-CNRS ;ISSN: 0302-9743 ;ISBN: 9783540638841 ;ISBN: 3540638849 ;EISSN: 1611-3349 ;EISBN: 9783540696605 ;EISBN: 3540696601 ;DOI: 10.1007/BFb0024827

Full text available

20
Classification based on homogeneous logical proportions
Material Type:
Book Chapter
Add to My Research

Classification based on homogeneous logical proportions

Research and Development in Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013, The Thirty-third SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence, 2013, p.53-60

Distributed under a Creative Commons Attribution 4.0 International License ;ISBN: 3319026208 ;ISBN: 9783319026206 ;DOI: 10.1007/978-3-319-02621-3_4

Digital Resources/Online E-Resources

Results 1 - 20 of 72  for All Library Resources

Results 1 2 3 4 next page

Searching Remote Databases, Please Wait