by
Karagiannis, Dimitris. editor.
Format:
Electronic Resources
Excerpt:
information. All domain-specific methods described in this volume also have a tool implementation within the
by
Lehto, Martti. editor.
Format:
Electronic Resources
Excerpt:
strategies in the cyber warfare -- 3 Cyber Security Strategy Implementation Architecture in a Value System
View Other Search Results
by
Boursas, Latifa. editor.
Format:
Electronic Resources
Excerpt:
Lightweight Virtual Desktop Management Architecture -- CIM-Based Resource Information Management for
by
Chen, Peter P. editor.
Format:
Electronic Resources
Excerpt:
-- Architecture for Active Conceptual Modeling of Learning -- Understanding the Semantics of Data Provenance to
by
Olivé, Antoni. author.
Format:
Electronic Resources
Excerpt:
necessary in order to develop an information system. Recently, many researchers and professionals share a
by
Davis, Rob. author.
Format:
Electronic Resources
Excerpt:
technical architecture of ARIS (Servers, Databases, Objects, Web Clients, etc) Containing tips, techniques
by
Krogstie, John. editor.
Format:
Electronic Resources
Excerpt:
Architecture -- Capturing Dependability Threats in Conceptual Modelling -- What Is Being Iterated? Reflections
by
Lemos, Rogério. editor.
Format:
Electronic Resources
Excerpt:
1. Critical Infrastructures -- The CRUTIAL Architecture for Critical Information Infrastructures
by
Peters, James F. editor.
Format:
Electronic Resources
Excerpt:
Echocardiography Dataset Using Rough Sets -- Rules and Apriori Algorithm in Non-deterministic Information Systems
by
Bassiliades, Nick. editor.
Format:
Electronic Resources
Excerpt:
Reasoning in Multi-Context Systems -- Personal Agents in the Rule Responder Architecture -- Semi-automatic
by
Bernus, Peter. editor.
Format:
Electronic Resources
Excerpt:
Integration -- DIISM 04 -- Manufacturing and Engineering in the Information Society: Responding to Global
by
Geffner, Hector. editor.
Format:
Electronic Resources
Excerpt:
Real-Time Commitments -- Hybrid Multi-agent Architecture (HoCa) Applied to the Control and Supervision of
Limit Search Results
Narrowed by: