19 Results
000000000000DEFAULT_TR
by 
Çağrıcı, Gökhan.
Format: 
El Yazması
Alıntı: 
. Cryptography is no exception and, computer scientists have discovered that parallelism could certainly be used
by 
Güngör, Mesut.
Format: 
El Yazması
Alıntı: 
construct a random variable in a computer environment, random number generation algorithms have also been
by 
Kaya, Özgür.
Format: 
El Yazması
Alıntı: 
Firewalls lead at the front line of a computer network to restrict unauthorized access. The desired
by 
Yıldız, Barış.
Format: 
El Yazması
Alıntı: 
implementation and comparison of two frequent itemset mining algorithms that work without candidate itemset
by 
Özardıç, Onur.
Format: 
El Yazması
Alıntı: 
Computer networks are being attacked everyday. Intrusion detection systems are used to detect and
by 
Tepeli, Murat.
Format: 
El Yazması
Alıntı: 
numbers has been investigated. There are also computer based algorithms to test large numbers.In this work
by 
Erdoğan, Yunus.
Format: 
El Yazması
Alıntı: 
algorithms.The Microsoft Windows Firewall API makes it possible to programmatically manage the features of
by 
Sülün, Erhan.
Format: 
El Yazması
Alıntı: 
faster data mining algorithms as time is very critical for those companies.Large amounts of datasets have