نتایج جستجو برای: large set

تعداد نتایج: 1587353  

Journal: :IEEE Transactions on Visualization and Computer Graphics 2014

Journal: :The Electronic Journal of Combinatorics 2000

Journal: :Sukkur IBA Journal of Computing and Mathematical Sciences 2017

M. Abadi, S. Jalili,

Intruders often combine exploits against multiple vulnerabilities in order to break into the system. Each attack scenario is a sequence of exploits launched by an intruder that leads to an undesirable state such as access to a database, service disruption, etc. The collection of possible attack scenarios in a computer network can be represented by a directed graph, called network attack gra...

2009
Carlos Kennedy

The present television system was designed nearly 50 years ago. Since then, there have been significant developments in technology, which are highly relevant to the television industries. For example, advances in the very-large-scale-integration (VLSI) technology and signal processing theories make it feasible to incorporate frame-store memory and sophisticated signal processing capabilities in...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید