|
|
|
|
|
|
|
Protected: Internet, Intranet, & Virtual Private NetworksA systematic guide to the technologies, standards, protocols, and means used for the transparent security of information interaction in computer networks, this resource enables an independent understanding of the various methods of providing computer and information security when using modern network technology. The basic features of both Web... | | The Nile Development Game: Tug-of-War or Benefits for All?
This book introduces an analytic framework constructed upon the iterated Prisoners' Dilemma game to model and analyze transboundary water interactions along the Nile River. It presents a thorough and in-depth analysis of the historical path through which conflict and cooperation have been generated among the Nile riparians over... | | Bayesian Networks and Influence Diagrams: A Guide to Construction and Analysis (Information Science and Statistics)Probabilistic networks, also known as Bayesian networks and influence diagrams, have become one of the most promising technologies in the area of applied artificial intelligence, offering intuitive, efficient, and reliable methods for diagnosis, prediction, decision making, classification, troubleshooting, and data mining under uncertainty.... |
|
|
Result Page: 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 |