Login / Signup
Is the crouching tiger a threat?
Robert L. Glass
Published in:
Commun. ACM (2006)
Keyphrases
</>
high availability
sir model
data sets
database
genetic algorithm
multi agent
countermeasures
neural network
web services
face recognition
pattern recognition
intrusion detection