熱門搜尋
分類(單選) |
顯示所有篩選
|
---|---|
配送方式(可複選) | |
其他(可複選) |
搜尋結果共 47 筆, 頁數 1 / 1
呈現:
A Machine Learning Based Model of Boko Haram
Chapter 1: Introduction.- Chapter 2: History of Boko Haram.- Chapter 3: Temporal Probabilistic Rules... more |
|||
Raindrops of Pain: Anthology
|
|||
Oath of Love: A collection of Poems
"OATH OF LOVE" is a collection of love and heartbreak poetries. It is not just a book, it is a mix o... more |
|||
A Machine Learning Based Model of Boko Haram
Chapter 1: Introduction.- Chapter 2: History of Boko Haram.- Chapter 3: Temporal Probabilistic Rules... more |
|||
Engineering a Better Future
|
|||
Engineering a Better Future
|
|||
The Global Cyber-Vulnerability Report
This is the first book that uses cyber-vulnerability data to explore the vulnerability of over four ... more |
|||
Engineering a Better Future: Interplay Between Engineering, Social Sciences, and Innovation
This open access book examines how the social sciences can be integrated into the praxis of engineer... more |
|||
Cyber Deception: Building the Scientific Foundation
This edited volume features a wide spectrum of the latest computer science research relating to cybe... more |
|||
Global Child Health: A Toolkit to Address Health Disparities
Presents and defines global health in the national context Compares and contrasts international and ... more |
|||
Indian Mujahideen: Computational Analysis and Public Policy
Advance Praise for Indian Mujahideen: Computational Analysis and Public Policy "This book presents a... more |
|||
Cyber Deception: Building the Scientific Foundation
This edited volume features a wide spectrum of the latest computer science research relating to cybe... more |
|||
The Global Cyber-vulnerability Report
This is the first book that uses cyber-vulnerability data to explore the vulnerability of over four ... more |
|||
Cyber Warfare: Building the Scientific Foundation
This book features a wide spectrum of the latest computer science research relating to cyber warfare... more |
|||
Geospatial Abduction: Principles and Practice
Imagine yourself as a military officer in a conflict zone trying to identify locations of weapons ca... more |
|||
Computational Analysis of Terrorist Groups: Lashkar-E-Taiba
Computational Analysis of Terrorist Groups: Lashkar-e-Taiba provides an in-depth look at Web intelli... more |
|||
Data-Driven Generation of Policies
This Springer Brief presents a basic algorithm that provides a correct solution to finding an optima... more |
|||
Indian Mujahideen: Computational Analysis and Public Policy
Advance Praise for Indian Mujahideen: Computational Analysis and Public Policy "This book presents a... more |
|||
Search Theory: A Game Theoretic Perspective
Search games and rendezvous problems have received growing attention in computer science within the ... more |
|||
A General Framework for Reasoning on Inconsistency
This SpringerBrief proposes a general framework for reasoning about inconsistency in a wide variety ... more |
|||
Handbook of Computational Approaches to Counterterrorism
Terrorist groups throughout the world have been studied primarily through the use of social science ... more |
|||
Moving Target Defense II: Application of Game Theory and Adversarial Modeling
Covers recent breakthroughs, accomplishments and future research in Moving Target Defense Presents a... more |
|||
Computational Analysis of Terrorist Groups: Lashkar-e-Taiba
Computational Analysis of Terrorist Groups: Lashkar-e-Taiba provides an in-depth look at Web intelli... more |
|||
Build Behaviour Model for Temporary Employees
|
|||
Geospatial Abduction
Imagine yourself as a military officer in a conflict zone trying to identify locations of weapons ca... more |
|||
Scalable Uncertainty Management: First International Conference, SUM 2007, Washington, Dc, USA, October 10-12, 2007, Proceedings
This book constitutes the refereed proceedings of the First International Conference on Scalable Unc... more |
|||
Knowledge Management: Organizational and Technological Dimensions
The importance and value of tracking and sharing the dispersed knowledge resources of contemporary o... more |
|||
Detecting Trust and Deception in Group Interaction
This book analyzes the multimodal verbal and nonverbal behavior of humans in both an artificial game... more |
|||
Detecting Trust and Deception in Group Interaction
This book analyzes the multimodal verbal and nonverbal behavior of humans in both an artificial game... more |
|||
Adaptive Autonomous Secure Cyber Systems
1 Describes the latest work on the attribution problem to help identify culprits of cyber-attacks 2 ... more |
|||
Adaptive Autonomous Secure Cyber Systems
1 Describes the latest work on the attribution problem to help identify culprits of cyber-attacks 2 ... more |
|||
Cyber Warfare: Building the Scientific Foundation
This book features a wide spectrum of the latest computer science research relating to cyber warfare... more |
|||
Handbook of Computational Approaches to Counterterrorism
Terrorist groups throughout the world have been studied primarily through the use of social science ... more |
|||
Moving Target Defense II: Application of Game Theory and Adversarial Modeling
Covers recent breakthroughs, accomplishments and future research in Moving Target Defense Presents a... more |
|||
Scalable Uncertainty Management: 7th International Conference, Sum 2013, Washington, DC, Usa, September 16-18, 2013, Proceedings
This book constitutes the refereed proceedings of the 7th International Conference on Scalable Uncer... more |
|||
Multimedia Database Systems: Issues and Research Directions
The information superhighway will bring vast amounts of information to everyone. Multimedia database... more |
|||
Multimedia Information Systems
|
|||
Knowledge Management: Organizational and Technological Dimensions
The importance and value of tracking and sharing the dispersed knowledge resources of contemporary o... more |
|||
Multimedia Information Systems
|
|||
We Are Not Users: Dialogues, Diversity, and Design
|
|||
India’s Children: Essays on Social Policy
Children constitute a sizeable proportion of India’s population. Despite progress along many fronts,... more |
|||
Gender in Primary and Secondary Education: A Handbook for Policy-makers and Other Stakeholders
|
|||
Role of Empirical Studies in Understanding & Supporting Engineering Design
|
|||
Child Labour and the Right to Education in South Asia
|
|||
Institutions, Relations and Outcomes: A Framework and Case Studies for Gender-Aware Planning
|
|||
Heterogeneous Agent Systems
Software agents are the latest advance in the trend toward smaller, modular pieces of code, where ea... more |
|||
Indian Industrialization: Structure and Policy Issues
India’s economic and industrial growth have been the subject of great debate among economists and po... more |