Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- artificial intelligence 7 Treffer
- network protocols 6 Treffer
- computer systems 5 Treffer
- data security 5 Treffer
- computer crime 4 Treffer
-
45 weitere Werte:
- computer networks 4 Treffer
- computer vision 4 Treffer
- cryptography 4 Treffer
- data communication systems 4 Treffer
- image analysis 4 Treffer
- network security 4 Treffer
- thema editeur::u computing and information technology::ut computer networking and communications 3 Treffer
- thema editeur::u computing and information technology::uy computer science::uyq artificial intelligence 3 Treffer
- thema editeur:u computing and information technology:ut computer networking and communications 3 Treffer
- thema editeur:u computing and information technology:uy computer science:uyq artificial intelligence 3 Treffer
- blockchain 2 Treffer
- classification 2 Treffer
- communication systems 2 Treffer
- correlation analysis 2 Treffer
- cyber security 2 Treffer
- data integration 2 Treffer
- databases 2 Treffer
- distributed computer systems 2 Treffer
- distributed ledger 2 Treffer
- engineering 2 Treffer
- image processing 2 Treffer
- intrusion detection 2 Treffer
- privacy 2 Treffer
- security systems 2 Treffer
- signal processing 2 Treffer
- software engineering 2 Treffer
- telecommunication networks 2 Treffer
- telecommunication systems 2 Treffer
- thema editeur::u computing and information technology::ur computer security 2 Treffer
- thema editeur::u computing and information technology::uy computer science::uyq artificial intelligence::uyqv computer vision 2 Treffer
- thema editeur:u computing and information technology:ur computer security 2 Treffer
- thema editeur:u computing and information technology:uy computer science:uyq artificial intelligence:uyqv computer vision 2 Treffer
- unsupervised learning 2 Treffer
- alphabet inc. 1 Treffer
- artificial neural networks 1 Treffer
- big data 1 Treffer
- clustering algorithms 1 Treffer
- computer access control 1 Treffer
- computer algorithms 1 Treffer
- computer input design 1 Treffer
- computer network security 1 Treffer
- computer passwords 1 Treffer
- computer programming 1 Treffer
- computer science 1 Treffer
- computer scientists 1 Treffer
Verlag
Publikation
Sprache
Inhaltsanbieter
12 Treffer
-
2022Online E-Book
-
In: Communications of the ACM, Jg. 61 (2018-07-01), Heft 7, S. 56-66serialPeriodicalZugriff:
-
In: Communications of the ACM, Jg. 58 (2015-07-01), Heft 7, S. 78-87serialPeriodicalZugriff:
-
In: Communications of the ACM, Jg. 59 (2016-11-01), Heft 11, S. 12-14serialPeriodicalZugriff:
-
In: Communications of the ACM, Jg. 62 (2019-07-01), Heft 7, S. 13-13serialPeriodicalZugriff:
-
In: MSDN, Jg. 30 (2015), Heft 1, S. 34-38Online serialPeriodicalZugriff:
-
In: eWeek, 2018-01-25, S. 1-1serialPeriodicalZugriff:
-
In: eWeek, 2017-09-25, S. 1-1serialPeriodicalZugriff:
-
In: eWeek, 2017-06-09, S. 1-1serialPeriodicalZugriff:
-
In: eWeek, 2015-09-11, S. 1-1serialPeriodicalZugriff: