Search alternatives:
application security » application scenarios, application service, application specific
developing patterns » development patterns, developing eastern, development pattern
patterns problem » patterns from, patterns robert, patterns stable
application security » application scenarios, application service, application specific
developing patterns » development patterns, developing eastern, development pattern
patterns problem » patterns from, patterns robert, patterns stable
1
by Lu, Wei.
Published 2021
Format:
Published 2021
Table of Contents: “....3 The Applicability of Hybrid Cloud Computing -- 3 Secure Ranked Search Model Over Hybrid Cloud -- 3...”
Click to View
2
3
by Karner, Michael.
Published 2024
Format:
Published 2024
Table of Contents: “... Applications -- 3.1 Direction of Arrival Estimation -- 3.2 Power Pattern Cross-Correlation Algorithm -- 3...”
Click to View
4
5
6
7
by Chand, Ramesh.
Published 2022
Format:
Published 2022
Table of Contents: “... Dietary Pattern -- 2.1 Consumption Expenditure on Food and Non-food Groups -- 2.2 Calorie Intake Trends...”
Click to View
8
by Awad, Mariette.
Published 2015
Format:
Published 2015
Table of Contents: “... Data -- Data Mining Process-Related Problems -- Security, Privacy, and Data Integrity -- Dealing...”
Click to View
9
10
by Gatzweiler, Franz W.
Published 2016
Format:
Published 2016
Table of Contents: “... for Marginalized Smallholder Farmers and Development: An Overview and Implications for Policy and Resear...”
Click to View
11
by Liu, Kung-Chung.
Published 2019
Format:
Published 2019
Table of Contents: “... -- 1 Introduction -- 2 Economic Development Patterns and Characteristics in General -- 2...”
Click to View
12
by Institute of Climate Change and Sustainable Development of Tsinghua University et al., Institute of.
Published 2021
Format:
Published 2021
Table of Contents: “...Intro -- List of the Research Projects of China's Long-Term Low-Carbon Development Strategies...”
Click to View
13
by Sencar, Husrev Taha.
Published 2022
Format:
Published 2022
Table of Contents: “... Forensics -- 10.7 Applications Beyond Forensics and Security -- 10.7.1 Multimedia Synchronization -- 10...”
Click to View
14
by Ravichandran, Aruna.
Published 2016
Format:
Published 2016
Table of Contents: “... Development -- Agile Empowerment Challenges -- Modern Application Architectures -- Microservices: Small Isn...”
Click to View
15
by Geraci, Angelo.
Published 2021
Format:
Published 2021
Table of Contents: “... Pattern Identification -- 1.4 Reinforcement Learning for Adaptive Network Resource Allocation -- 1...”
Click to View
16
by Kołodziej, Joanna.
Published 2022
Format:
Published 2022
Table of Contents: “... of Security Operations in Digital Service Chains -- 1 Introduction -- 2 Related Work -- 3 The GUARD Framework...”
Click to View
17
by Veldkamp, Bernard P.
Published 2019
Format:
Published 2019
Table of Contents: “....3.4 Facilitating Monitoring and Adjusting -- 2.4 An Application of the Test Accessibility Framework: The Dutch...”
Click to View
18
by Fischer-Kowalski, Marina.
Published 2014
Format:
Published 2014
Table of Contents: “... in Development -- 1.4 Appreciating an Innovative Scholar -- References -- Chapter 2"Finding Out Is My Life...”
Click to View
19
by Biele, Cezary.
Published 2023
Format:
Published 2023
Table of Contents: “....2 Accompanying Poster -- 2.3 Implementation of Air Pollution Visual Representation -- 2.4 Application Development...”
Click to View


