Computer Applications

Results: 4069



#Item
91

A Characterization of Malicious Android Applications Lorenzo Gomez Iulian Neamtiu Department of Computer Science and Engineering University of California, Riverside {gomezl,neamtiu}@cs.ucr.edu

Add to Reading List

Source URL: www.lorenzobgomez.com

- Date: 2012-08-19 21:31:07
    92

    Probability with Engineering Applications ECE 313 Course Notes Bruce Hajek Department of Electrical and Computer Engineering University of Illinois at Urbana-Champaign

    Add to Reading List

    Source URL: www.ifp.illinois.edu

    - Date: 2011-01-06 15:01:57
      93

      INFORMATION TECHNOLOGY Certificate Computer Applications Specialist SCH ITSC

      Add to Reading List

      Source URL: academicaffairs.southtexascollege.edu

      - Date: 2016-11-30 09:46:37
        94

        ISSN:A Bouchboua et al, Int.J.Computer Technology & Applications,Vol 5 (3),UML design model of the learner and the domain model in a dynamic adaptive hypermedia environment

        Add to Reading List

        Source URL: www.ijcta.com

        - Date: 2014-07-01 03:06:30
          95

          Malicious Android Applications in the Enterprise: What Do They Do and How Do We Fix It? Xuetao Wei, Lorenzo Gomez, Iulian Neamtiu, Michalis Faloutsos Department of Computer Science and Engineering, University of Californ

          Add to Reading List

          Source URL: www.lorenzobgomez.com

          - Date: 2012-08-19 21:31:08
            96

            Proceedings of the International Computer Music Conference (ICMC) June 1–5, 2010, New York A MODULAR SOUND DESCRIPTOR ANALYSIS FRAMEWORK FOR RELAXED-REAL-TIME APPLICATIONS Diemo Schwarz, Norbert Schnell IRCAM–CNRS S

            Add to Reading List

            Source URL: articles.ircam.fr

            - Date: 2010-08-09 13:31:54
              97

              International Journal of Computer Science and Applications, ”Technomathematics Research Foundation Vol. 13, No. 2, pp. 45 – 60, 2016 A NOVEL NEURAL NETWORKS-BASED TEXTURE IMAGE PROCESSING ALGORITHM FOR ORANGE DEFECTS

              Add to Reading List

              Source URL: www.tmrfindia.org

              - Date: 2016-06-21 06:30:21
                98

                COPYRIGHT FORM International Journal of Computer Science & Applications ISSN   Copyright Transfer and Declaration for the IJCSA  

                Add to Reading List

                Source URL: www.tmrfindia.org

                - Date: 2014-01-23 06:11:20
                  99

                  Two Visual Computer Network Security Monitoring Tools Incorporating Operator Interface Requirements William Yurcik James Barlow* Kiran Lakkaraju Mike Haberman National Center for Supercomputing Applications (NCSA) Univer

                  Add to Reading List

                  Source URL: www.andrewpatrick.ca

                  - Date: 2003-02-12 07:18:34
                    100

                    On Evaluation of Video Quality Metrics: an HDR Dataset for Computer Graphics Applications ˇ ık, Tun¸c O. Aydın, Karol Myszkowski, Hans-Peter Seidel Martin Cad´ MPI Informatik ABSTRACT

                    Add to Reading List

                    Source URL: zurich.disneyresearch.com

                    - Date: 2011-11-06 08:00:22
                      UPDATE