University of Jan

Results: 1698



#Item
401Computer security / Denial-of-service attack / Transmission Control Protocol / Traffic flow / Deep packet inspection / Secure Shell / Sliding window protocol / Port knocking / Deep content inspection / Computer network security / Computing / Cyberwarfare

Flow-based Brute-force Attack Detection Martin Draˇsar, Jan Vykopal Masaryk University Institute of Computer Science Botanick´a 68a, Brno, Czech Republic Philipp Winter

Add to Reading List

Source URL: www.cs.kau.se

Language: English - Date: 2014-05-26 09:37:41
402Phyla / Octopuses / Bobtail squid / Incirrina / Cephalopod / Cirrina / Coleoidea / Octopodiformes / Spirulida / Zoology / Cephalopods / Taxonomy

Cephalopod mollusks (Cephalopoda) Jan M. Strugnella,*, Annie Lindgrenb, and A. Louise Allcockc a Department of Zoology, University of Cambridge, Downing St,

Add to Reading List

Source URL: 69.36.181.148

Language: English - Date: 2009-05-26 18:11:56
403Higher education / Education / Student affairs / Carnegie Mellon University / Academia

The following message from Dean of Student Affairs Gina Casalegno was sent to the campus community on Friday, Jan. 30, 2015. Dear Members of the Carnegie Mellon Community: It is with deep sadness that I am writing to inf

Add to Reading List

Source URL: www.cmu.edu

Language: English - Date: 2015-04-24 17:05:21
404Subsidy / Taxation / Transportation planning / Sustainable transport / Urban sprawl / Public transport / Tax / Traffic congestion / Transport / Public finance / Subsidies

Regional Science and Urban Economics – 733 www.elsevier.com/locate/econbase Transport subsidies, system choice, and urban sprawl Jan K. Brueckner Department of Economics, University of California, Irvine,

Add to Reading List

Source URL: www.vwl.tuwien.ac.at

Language: English - Date: 2008-04-09 05:07:37
405Real-time web / Social media / Text messaging / Twitter / Websites / Personalization / Tf*idf / IJ / Information science / Information retrieval / Science

Interweaving Trend and User Modeling for Personalized News Recommendation Qi Gao, Fabian Abel, Geert-Jan Houben, Ke Tao Web Information Systems Group Delft University of Technology Delft, the Netherlands Email:{q.gao, f.

Add to Reading List

Source URL: fabianabel.de

Language: English - Date: 2011-08-09 03:16:49
406Francis Guthrie / Augustus De Morgan / Mathematics / Graph coloring / Four color theorem

A note on the history of the four-colour conjecture arXiv:1201.2852v1 [math.CO] 13 Jan 2012 Brendan D. McKay Research School of Computer Science Australian National University

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2014-01-22 02:55:40
407Urban decay / United States Department of Housing and Urban Development / Politics of the United States / Moving to Opportunity / Poverty / Concentrated poverty / Section 8 / Civil Rights Act / Public housing / Public housing in the United States / Affordable housing / Housing

Mapping Opportunity: A Critical Assessment Eli Knaap, Gerrit-Jan Knaap, and Chao Liu National Center for Smart Growth University of Maryland

Add to Reading List

Source URL: smartgrowth.umd.edu

Language: English
408Bismuth ferrite / Multiferroics / Wang

Associate Professor Wang Junling, Nanyang Technological University Academic Qualification: Ph.D., Materials Science and Engineering, Jan 2005, Univ. of Maryland, College Park, USA B. S., Materials Science and Engineerin

Add to Reading List

Source URL: www3.ntu.edu.sg

Language: English - Date: 2012-10-03 22:30:51
409Geometry / Computer vision / Digital geometry / Topology / Shape analysis / Shape context / Shape / Dimension / Geodesic / Differential geometry / Mathematics / Image processing

Balancing Deformability and Discriminability for Shape Matching Haibin Ling, Xingwei Yang, and Longin Jan Latecki Center for Information Science and Technology, Dept. of Computer and Information Science Temple University

Add to Reading List

Source URL: www.dabi.temple.edu

Language: English - Date: 2010-06-20 02:09:10
410Graphics file formats / Topology / Computer file formats / Data compression / Steganography / JPEG / Steganalysis / Compression artifact / Embedding / Mathematics / Computing / Audio engineering

Influence of Embedding Strategies on Security of Steganographic Methods in the JPEG Domain Jan Kodovský, Jessica Fridrich∗ Department of Electrical and Computer Engineering, Binghamton University, State University of

Add to Reading List

Source URL: www.ws.binghamton.edu

Language: English - Date: 2007-12-13 12:09:14
UPDATE