Systems analysis

Results: 12418



#Item
961

Call for Papers ACM Transactions on Intelligent Systems and Technology (ACM TIST) Special Issue on Intelligent Visual Interfaces for Text Analysis

Add to Reading List

Source URL: tist.acm.org

Language: English - Date: 2016-02-19 15:15:22
    962

    A Phase Discrepancy Analysis of Object Motion Bolei Zhou1,2? , Xiaodi Hou3? , Liqing Zhang1 1 MOE-Microsoft Key Laboratory for Intelligent Computing and Intelligent Systems, Department of Computer Science and Engineering

    Add to Reading List

    Source URL: www.houxiaodi.com

    Language: English - Date: 2016-02-16 01:46:51
      963

      Conference on Cryptographic Hardware and Embedded Systems (CHES) Santa Barbara, USA – August 17-19, 2016 Call for Papers The annual CHES conference highlights new results in the design and analysis of cryptographic har

      Add to Reading List

      Source URL: www.chesworkshop.org

      Language: English - Date: 2016-02-15 09:19:48
        964

        Survey of Event-triggered Reactive Systems and Requirements Analysis

        Add to Reading List

        Source URL: ceur-ws.org

        Language: English - Date: 2009-06-05 09:57:20
          965

          David Goodger   ∙  http://python.net/~goodger SUMMARY Over 20 years of professional experience in systems analysis, software development, and training. 

          Add to Reading List

          Source URL: python.net

          Language: English - Date: 2016-01-27 22:33:43
            966Construction / Engineering / Real estate / Seismology / Earthquake engineering / Structural engineering / Civil engineering

            The School is funded by Russian Science Foundation (RSF) within the framework of RSF Project "Application of systems analysis for estimation of seismic hazard in the regions of Russia" and

            Add to Reading List

            Source URL: school2016.gcras.ru

            Language: English - Date: 2016-02-20 07:53:14
            967

            SPIEKERMANN, S., ZIEKOW, H., "RFID: A SYSTEMATIC ANALYSIS OF PRIVACY THREATS & A 7-POINT PLAN TO ADDRESS THEM”, JOURNAL OF INFORMATION SYSTEMS SECURITY, VOL. 1, NR. 3, 2006 RFID: A SYSTEMATIC ANALYSIS OF PRIVACY THREAT

            Add to Reading List

            Source URL: ec-wu.at

            Language: English - Date: 2014-07-13 07:58:03
              968

              exploRase: Multivariate exploratory analysis and visualization for systems biology Michael Lawrence, Dianne Cook, Eun-Kyung Lee June 6, 2007

              Add to Reading List

              Source URL: www.metnetdb.org

              Language: English - Date: 2014-03-18 15:41:10
                969Engineering / Survival analysis / Software quality / Design for X / Failure / Materials science / Reliability engineering

                Modelling of Service Reliability Using OpenTrack IT 08 Closing the Loop - Capacity and Quality of Railway Systems JanuaryPhotograph copyright Pacific National

                Add to Reading List

                Source URL: www.opentrack.ch

                Language: English - Date: 2010-05-20 04:49:30
                970Computing / Cyberwarfare / Botnets / Computer network security / Multi-agent systems / Spamming / Concurrent computing / Domain generation algorithm / Malware / Sality / Denial-of-service attack / Computer virus

                AUTOPROBE: Towards Automatic Active Malicious Server Probing Using Dynamic Binary Analysis Zhaoyan Xu Antonio Nappa

                Add to Reading List

                Source URL: faculty.cs.tamu.edu

                Language: English - Date: 2014-09-29 02:03:52
                UPDATE