Access the full text.
Sign up today, get DeepDyve free for 14 days.
Aleix Martinez, A. Kak (2001)
PCA versus LDAIEEE Trans. Pattern Anal. Mach. Intell., 23
(2007)
Computing is a natural scienceCommun. ACM, 50
J. Ryan, M. Lin, R. Miikkulainen (1997)
Intrusion Detection with Neural Networks
(2007)
The Modern Problems of Information Security and Their Realization in the Scientific Activity of the Southern Federal University , Izvestiya YuFU
Editorial Dogan, Aksit Ruhgun, Basar Beliz, Tascioglu Celik, M. Akşit (2000)
Correspondence Address
Ya.A. Bryukhomotskii, M.N. Kazarin (2003)
Izvestiya TRTU
V. Jacobson, R. Braden, D. Borman (1989)
Internet Engineering Task Force
A. Grusho, N. Grebnev, E. Timonina (2007)
Covert channel invisibility theoremCommunications in computer and information science, 374
D. Milojicic (1967)
Security and privacyCommun. ACM, 10
U. Lindqvist, P.A. Porras (1999)
IEEE Symp. Security and Privacy
(2007)
On Security and Reliability of Protection Subsystems in Distributed Information Systems , Sistemy i sredstva informatiki
N.B. Burdonov, A.S. Kosachev, V.N. Ponomarenko, V.Z. Shnitman (2006)
A Review of Approaches to Verifying Distributed Systems
V.E. Wolfengagen (2004)
Methods and Means for Computations with Objects, Applicative Computer Systems
J. Lu, K.N. Plataniotis, A.N. Venetsanopoulus (2003)
Face Recognition Using LDA-Based AlgorithmsIEEE Trans. Neural Networks, 14
C. Zaniolo, S. Ceri, C. Faloutsos, R. Snodgrass, V. Subrahmanian, R. Zicari (1997)
Advanced Database Systems
Charles Jacobs, Adam Finkelstein, D. Salesin (1995)
Fast multiresolution image queryingProceedings of the 22nd annual conference on Computer graphics and interactive techniques
O. Zimmermann, M. Tomlinson, Stefan Peuser (2003)
Perspectives on Web Services
C.E. Jacobs, A. Finkelstein, D.H. Salesin (1995)
Fast Multiresolution Image QueringProc. of SIGGAPH’95, New York, 286
Ian Foster, C. Kesselman, G. Tsudik, S. Tuecke (1998)
A security architecture for computational grids
The solution of large-dimension information-computing tasks with the use of globally distributed computing environments requires that special attention be paid to the problem of information security. This is urgent for both an information-computer system itself and its constituent subsystems and its users.
Automatic Documentation and Mathematical Linguistics – Springer Journals
Published: Sep 17, 2009
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.