Linked e-resources
Details
Table of Contents
User-Centered Design of Geographic Interactive Applications: From High-Level Specification to Code Generation, from Prototypes to better Specifications
Applying Data Analytic Techniques for Fault Detection
Protecting Biometrics Using Fuzzy Extractor and Non-invertible Transformation Methods in Kerberos Authentication Protocol
Parallel Learning of Local SVM Algorithms for Classifying Large Datasets
Contractual Specifications of Business Services: Modeling, Formalization, and Proximity
Energy-Saving Virtual Machine Scheduling in Cloud Computing with Fixed Interval Constraints.
Applying Data Analytic Techniques for Fault Detection
Protecting Biometrics Using Fuzzy Extractor and Non-invertible Transformation Methods in Kerberos Authentication Protocol
Parallel Learning of Local SVM Algorithms for Classifying Large Datasets
Contractual Specifications of Business Services: Modeling, Formalization, and Proximity
Energy-Saving Virtual Machine Scheduling in Cloud Computing with Fixed Interval Constraints.