Narrow your search

Library

KU Leuven (2318)

ULiège (2033)

ULB (1944)

VIVES (1730)

Odisee (1726)

Thomas More Kempen (1726)

Thomas More Mechelen (1726)

UCLL (1628)

UGent (815)

KBC (415)

More...

Resource type

book (2312)

digital (8)

periodical (6)


Language

English (2301)

German (7)

Italian (4)

French (3)

Dutch (2)

More...

Year
From To Submit

2024 (109)

2023 (75)

2022 (34)

2021 (89)

2020 (143)

More...
Listing 1 - 10 of 2318 << page
of 232
>>
Sort by

Book
Data Science and Advanced Analytics (DSAA) : 2015. 36678 2015. IEEE International Conference on
Author:
ISBN: 1467382728 1467382744 1467382736 Year: 2015 Publisher: Piscataway, NJ : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
IEEE Std 1667-2018 (Revision of IEEE Std 1667-2015) : IEEE Standard for Discovery, Authentication, and Authorization in Host Attachments of Storage Devices
Author:
ISBN: 1504450051 Year: 2018 Publisher: New York : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Discovery, authentication, and authorization protocols between hosts and storage devices over multiple transports are defined in this standard.


Book
"2020 Swedish Workshop on Data Science (SweDS)"
Author:
ISBN: 1728192048 9781728192048 1728192056 Year: 2020 Publisher: IEEE

Loading...
Export citation

Choose an application

Bookmark

Abstract

This yearly workshop brings together researchers and practitioners of data science working in a variety of academic, commercial, industrial, or other sectors.


Book
Proceedings of the 13th European Conference on Software Architecture.
Authors: --- --- --- --- --- et al.
Year: 2019 Publisher: New York, NY : Association for Computing Machinery,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The European Conference on Software Architecture (ECSA), held this year from September 9th to 13th at the FIAP, in Paris, France, is a premier European software architecture conference providing researchers, practitioners, and educators with a platform to present and discuss the most recent, innovative and significant findings and experiences in the field of software architecture research and practice. This year was special, as we shared the venue and part of the program with the Systems & Software Product Lines Conference (SPLC). Some keynotes and tracks were common to both events. In addition to the main track, the conference featured various events and tracks including the Track on Women in Software Engineering (WSE), a Doctoral symposium, a Tool, demos and poster session, and six workshops. All these events were held with the aim to explore new trends and to support researchers in the early stages of their careers.


Book
5th Joint International Conference on Data Science & Management of Data (9th ACM IKDD CODS and 27th COMAD)
Author:
Year: 2022 Publisher: New York, NY : Association for Computing Machinery,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Applying data structures.
Authors: ---
ISBN: 0395317061 Year: 1982 Publisher: Boston Houghton Mifflin

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Proceedings of the 2nd conference on Theory and practice of provenance
Author:
Year: 2010 Publisher: Berkeley, CA : USENIX Association,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Core concepts in data analysis : summarization, correlation and visualization.
Author:
ISBN: 9780857292865 Year: 2011 Publisher: London Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Multiprocessor Scheduling : Theory and Applications
Author:
ISBN: 9535158198 3902613025 Year: 2007 Publisher: IntechOpen

Loading...
Export citation

Choose an application

Bookmark

Abstract

A major goal of the book is to continue a good tradition - to bring together reputable researchers from different countries in order to provide a comprehensive coverage of advanced and modern topics in scheduling not yet reflected by other books. The virtual consortium of the authors has been created by using electronic exchanges; it comprises 50 authors from 18 different countries who have submitted 23 contributions to this collective product. In this sense, the volume can be added to a bookshelf with similar collective publications in scheduling, started by Coffman (1976) and successfully continued by Chretienne et al. (1995), Gutin and Punnen (2002), and Leung (2004). This volume contains four major parts that cover the following directions: the state of the art in theory and algorithms for classical and non-standard scheduling problems; new exact optimization algorithms, approximation algorithms with performance guarantees, heuristics and metaheuristics; novel models and approaches to scheduling; and, last but least, several real-life applications and case studies.


Book
IEEE Std 2600.4-2010
Author:
ISBN: 0738161675 Year: 2010 Publisher: [Place of publication not identified] : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Abstract: A Protection Profile for Hardcopy Devices in a small, private information processing environment is discussed in this standard in which most elements of security are provided by the physical environment, but basic network security is needed to protect the device and its network from misuse from outside of the environment. Small offices and home offices are typical applications of this environment. This environment will be known as "Operational Environment D." Keywords: all-in-one, Common Criteria, copier, disk overwrite, document, document server, document storage and retrieval, facsimile, fax, hardcopy, ISO/IEC 15408, multifunction device (MFD), multifunction product (MFP), network, network interface, nonvolatile storage, office, paper, printer, Protection Profile, residual data, scanner, security target, shared communications medium, temporary data.

Listing 1 - 10 of 2318 << page
of 232
>>
Sort by