Author: Memon Nasrullah Wiil Uffe Kock Qureshi Pir Abdul Rasool
Publisher: Inderscience Publishers
ISSN: 1743-8187
Source: International Journal of Business Intelligence and Data Mining, Vol.5, Iss.2, 2010-01, pp. : 134-155
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
Practical overview of a Xen covert channel
Journal in Computer Virology, Vol. 6, Iss. 4, 2010-11 ,pp. :
Practical Algorithms for Polycyclic Matrix Groups
By Ostheimer G.
Journal of Symbolic Computation, Vol. 28, Iss. 3, 1999-09 ,pp. :
A family of optimal termination detection algorithms
By Mittal Neeraj Venkatesan S. Peri Sathya
Distributed Computing, Vol. 20, Iss. 2, 2007-08 ,pp. :
A Performance Measure for Boundary Detection Algorithms
By Palmer P.L. Dabis H. Kittler J.
Computer Vision and Image Understanding, Vol. 63, Iss. 3, 1996-05 ,pp. :