Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Detecting'
Detecting published presentations and documents on DocSlides.
Crouching Admin, Hidden Hacker
by karlyn-bohler
Techniques for Hiding and Detecting Traces. Paul....
An approach for detecting encrypted insider attacks
by danika-pritchard
on . OpenFlow. SDN Networks. Author:. . Charles...
Control C: Detecting and Deterring Plagiarism in a Digital
by tatyana-admore
Workshop and Powerpoint © Catherine Bacque. cath...
DETECTING ELECTRIC CHARGE
by conchita-marotz
KEY TERMS. Electroscope. Induced charge separatio...
Detecting and amplifying an environmental stimulus
by karlyn-bohler
Advanced Higher Biology 2015. In archaea, bacteri...
Detecting and amplifying an environmental stimulus
by tatyana-admore
Cell . Signaling. In order to respond to changes ...
Image Steganography
by mitsue-stanley
Cryptographic Anonymity Project. Alan Le. A littl...
1 Register Disbursement Schemes
by tawny-fly
Chapter 8. 2. Pop Quiz. According to the . 2011 G...
Co-production - detecting opportunities and realising them
by briana-ranney
Bernd Sass / Disability Rights UK. The ‘Change ...
Detecting Disguised Plagiarism Hatem A. Mahmoud University of Waterloo
by luanne-stotts
Plagiarism as Logical Cloning Firstly the notion o...
Towards Detecting Influenza Epidemics by Analyzing Twitter
by sherrill-nordquist
Aron. . Culotta. Jedsada Chartree. Introduction....
Detecting Gravitational Waves
by min-jolicoeur
with a Pulsar . T. iming Array. Lindley . Lentati...
Detecting selection using genome scans
by ellena-manuel
Roger Butlin. University of Sheffield. Nielsen R....
SPHINX: Detecting Security Attacks in Software-Defined Netw
by kittie-lecroy
Presented By: . Mo...
Understanding and Detecting Real-World Performance Bugs
by jane-oiler
Guoliang. Jin, . Linhai. Song. , . Xiaoming. S...
FRAppE
by lois-ondreau
: Detecting Malicious Facebook . Applications. Md...
Detecting Traffic Congestion s Using Cell Phone Accelerometers
by natalia-silvester
2 04 06 08 12 14 Fluent Congestion Fluent Moderate...
The Role of Web Hosting Providers in Detecting Compromised Websites Davide Canal
by marina-yarberry
fr Davide Balzarotti EURECOM France balzarottieure...
Detecting People Using Mutually Consistent Poselet Activations Lubomir Bourdev
by phoebe-click
San Jose CA lbourdevsmajibroxmalik eecsberkeleyed...
Agriculture Ecosystems and Environment Contents lists available at ScienceDir
by sherrill-nordquist
elseviercomlocateagee Detecting pest control servi...
Updated s AgAb Combo Information Sheet for Testing Programs s AgAb Combo Determine Combo is a rapid test capable of detecting HIV p antigen and HIV and HIV antibodies
by tatiana-dople
The p24 antigen is a part of the HIV virus and ca...
DETECTING INDIAN CLASSICAL VOCAL STYLES FROM MELODIC CONTOURS Amruta Vidwans Kaustuv Kanti Ganguli Preeti Rao Department of Electrical Engineering Indian Institute of Technology Bombay nd CompMusic W
by lois-ondreau
Todi 40 32 80 Subhapanthuvarali 40 36 90 2 Malka...
Detecting Cheaters for Multiplayer Games Theory Design
by tatyana-admore
F Yeung John CS Lui Department of Computer Science...
A Study of Detecting Computer Viruses in RealInfected Files in the gram Representation with Machine Learning Methods Note this is an extended version
by faustina-dinatale
The LNCS published versio n is available via spri...
Model for Detecting the Existence of Unkno wn Computer Viruses in RealTime Je rey M
by danika-pritchard
oas Reliable Soft are ec hnologies en thouse Suit...
Detecting Mobile Phone Accessories Peter Chadbourne Senior Applications Manager USB Signal Path Applications Group Fairchild Semiconductor South Portland ME INTRODUCTION The number of mobile phones s
by debby-jeon
Smartphones have more features and applications t...
Detecting and Measuring Similarity in Code Clones Randy Smith and Susan Horwitz Department of Computer Sciences University of Wisconsin Madison smithrhorwitz cs
by trish-goza
wiscedu Abstract Most previous work on codeclone d...
Detecting Scene Elements Using Maximally Stable Colour Regions Stanislav Basovnik Lukas Mach Andrej Mikulik and David Obdrzalek Charles University in Prague Faculty of Mathematics and Physics Malostr
by alida-meadow
com lukasmachgmailcom andrejmikulikgmailcom davido...
Markov Networks for Detecting Overlapping Elements in Sequence Data Joseph Bockhorst Dept
by test
of Computer Sciences University of Wisconsin Madi...
Rev G APRIL Dell Reliable Memory Technology Detecting and isolating memory errors THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES
by liane-varnes
10 G12000462 APRIL 2012 Dell Reliable Memory Tech...
Statically Detecting Likely Buffer Overflow Vulnerabilities David Larochelle larochellecs
by ellena-manuel
virginiaedu University of Virginia Department of C...
Detecting Spoofed Packets Steven J
by alida-meadow
Templeton Karl E Levitt Department of Computer Sc...
Road Sign Detection and Recognition Abstract Introduction Submitted to the IEEE Computer Society International Conference on Computer Vision and Pattern Recognition June
by luanne-stotts
brPage 2br Detecting the Signs a b Figure 1 a sho...
ro duct on In ecen ea bunda sequence da ta ha ed to widespr in ter st in metho detecting eno ic den ifying esp ecia lly no nco ing sequences tha the cr ll br es lo i
by jane-oiler
e tha ea ca ndida te sequence is under electio ll ...
Main sequence An index for detecting mental workload variation in complex tasks Leandro Luigi Di Stasi Adoracin Antol Jos Juan Caas Cognitive Ergonomics Group Department of Experimental Psychology
by cheryl-pisano
Taking the Wickens multiple resource model as the...
Knowledge Acquisifion Detecting and correcting errors in rulebased expert systems an integration of empirical and explanation based learning MICHAEL J
by conchita-marotz
PAZZANI AND CLIFFORD A BRUNK Department of Inform...
Detecting High LogDensities an Approximation for Densest Subgraph Aditya Bhaskara Moses Charikar Eden Chlamtac Uriel Feige Aravindan Vijayaraghavan Abstract In the Densest Subgraph problem given a
by phoebe-click
There is a signi64257cant gap between the best kn...
In Proceedings of the th International Conference on Comp uter Vision ICCV IEEE Video Parsing forAbnormality Detection Borislav Anticand Bjorn Ommer InterdisciplinaryCenterforScienticComputingUniver
by celsa-spraggs
anticbommer iwruniheidelbergde Abstract Detecting ...
Towards Detecting Anomalous User Behavior in Online Social Networks Bimal Viswanath MPISWS M
by pamella-moone
Ahmad Bashir MPISWS Mark Crovella Boston Universi...
ASTUTE Detecting a Different Class of Trafc Anomalies Fernando Silveira Christophe Diot Nina Taft Ramesh Govindan Technicolor UPMC Paris Universitas Intel Labs Berkeley University of Southern Califor
by debby-jeon
This equilibrium property holds if the ows are ne...
Load More...