Login / Signup

Is the crouching tiger a threat?

Robert L. Glass
Published in: Commun. ACM (2006)
Keyphrases
  • high availability
  • sir model
  • data sets
  • database
  • genetic algorithm
  • multi agent
  • countermeasures
  • neural network
  • web services
  • face recognition
  • pattern recognition
  • intrusion detection