儲存已註記</a>
<span name='save_page_btn1' id='save_page_btn1' style='visibility: visible' ><a href= 儲存本頁所有記錄
作者 (1-26 之 26)
Purdue University. Computer Sciences
1
book jacket

Automatic migration to role based access control
Molloy, Ian M

 
紙本資料

館藏地: 中央研究院
2
book jacket

Biomedical literature mining with transitive closure and maximum network flow
Hoblitzell, Andrew P

 
紙本資料

館藏地: 資訊服務處
3
book jacket

Capturing real-world dynamic objects using temporally-coded photography
Xu, Yi

 
紙本資料

館藏地: 中央研究院
4
book jacket

Characterizing and aggregating attack graph-based security metric
Idika, Nwokedi C

 
紙本資料

館藏地: 中央研究院
5
book jacket

Data-centric approaches to kernel malware defense
Rhee, Junghwan

 
紙本資料

館藏地: 資訊服務處
6
book jacket

A database server for next-generation scientific data management
Eltabakh, Mohamed Y

 
紙本資料

館藏地: 中央研究院
7
book jacket

Graph based mining on weighted directed graphs for subnetworks and path discovery
Abdulkarim, Sijin Cherupilly

 
紙本資料

館藏地: 資訊服務處
8
book jacket

Improved 3-D scene sampling by camera model design
Rosen, Paul Andrew

 
紙本資料

館藏地: 中央研究院
9
book jacket

Improving the reliability and performance of virtual cloud infrastructures
Kangarlou-Haghighi, Ardalan

 
紙本資料

館藏地: 資訊服務處
10
book jacket

Information security applications of natural language processing techniques
Topkara, Umut

 
電子書

館藏地: 中央研究院
11
book jacket

Iterative visual analytics and its applications in bioinformatics
You, Qian

 
紙本資料

館藏地: 中央研究院
12
book jacket

Key management in hierarchical access control systems
Blanton, Marina V

 
電子書

館藏地: 中央研究院
13
book jacket

Knowledge discovery and hypothesis generation from biomedical literature using text mining
Vaka, Harsha Gopal Goud

 
紙本資料

館藏地: 中央研究院
14
book jacket

Modeling of light reflection, transmission, and subsurface scattering for realistic image synthesis
Xu, Huiying

 
電子書

館藏地: 中央研究院
15
book jacket

Multi-angle facial image analysis
Liu, Ying

 
紙本資料

館藏地: 中央研究院
16
book jacket

A platform for creating efficient, robust, and resilient peer-to-peer systems
Zage, David J

 
紙本資料

館藏地: 中央研究院
17
book jacket

Practical automatic determination of causal relationships in software execution traces
Jeyaraman, Sundararaman

 
紙本資料

館藏地: 資訊服務處
18
book jacket

Privacy-aware role based access control
Ni, Qun

 
紙本資料

館藏地: 中央研究院
19
book jacket

Reverse engineering of data structures from binary
Lin, Zhiqiang

 
紙本資料

館藏地: 資訊服務處
20
book jacket

Security and privacy techniques for outsourced and distributed databases
Yuan, Hao

 
紙本資料

館藏地: 中央研究院
21
book jacket

Seed and grow: An attack against anonymized social networks
Peng, Wei

 
紙本資料

館藏地: 資訊服務處
22
book jacket

Statistical inference and data cleaning in relational database systems
Mayfield, Christopher S

 
紙本資料

館藏地: 資訊服務處
23
book jacket

Structural information in strings and graphs
Choi, Yong Wook

 
紙本資料

館藏地: 中央研究院
24
book jacket

Supporting views in data stream management systems
Ghanem, Thanaa M

 
紙本資料

館藏地: 中央研究院
25
book jacket

Transparent distribution for Java applications
McGachey, Philip

 
紙本資料

館藏地: 中央研究院
26
book jacket

Trusted enforcement of contextual access control
Kirkpatrick, Michael S

 
紙本資料

館藏地: 資訊服務處
儲存已註記</a>
<span name='save_page_btn2' id='save_page_btn2' style='visibility: visible' ><a href= 儲存本頁所有記錄