Search results
Lecture Notes in Computer Science > Advanced Data Mining and Applications > III Data Mining Methodologies and Processes > 13-20
Lecture Notes in Computer Science > Engineering Psychology and Cognitive Ergonomics > Driving Safety and Support > 404-413
Lecture Notes in Computer Science > HCI and Usability for e-Inclusion > Usability Testing, Evaluation, Measurement: Education, Learning and e-Inclusion > 178-192
Lecture Notes in Computer Science > Computer Performance Evaluation and Benchmarking > Power/Thermal Benchmarking > 97-101
Lecture Notes in Computer Science > Computational Science — ICCS 2001 > Architecture-Specific Automatic Performance Tuning > 81-96
Lecture Notes in Computer Science > Performance Evaluation, Measurement and Characterization of Complex Systems > 216-231
Lecture Notes in Computer Science > Algorithms and Architectures for Parallel Processing > Track 3: Grid Computing > 314-325
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Session 4: Signatures and Friends > 166-182
Lecture Notes in Computer Science > High Performance Computing - HiPC 2008 > Session II: Parallel Algorithms and Applications > 131-141
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2007 > Workshop on Information Systems and Information Technologies (ISIT 7) > 334-345
Lecture Notes in Computer Science > Distributed Computing in Sensor Systems > Performance of a Propagation Delay Tolerant ALOHA Protocol for Underwater Wireless Networks > 157-175
Lecture Notes in Computer Science > Parallel and Distributed Processing and Applications > Session 9B: High Performance Computing and Architecture > 1007-1016
Lecture Notes in Computer Science > HCI and Usability for e-Inclusion > Applications and Analyses: Interaction, Assistive Technologies and Virtual Environments > 448-456
Lecture Notes in Computer Science > Architecture of Computing Systems - ARCS 2011 > Network-on-Chip Architectures > 231-242
Lecture Notes in Computer Science > Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks > Performance and Security > 84-94