Facet browsing currently unavailable
Page 1 of 145787 results
Sort by: relevance publication year
Using Assignment Constraints to Avoid Empty Clusters in k-Means Clustering BOOK CHAPTER published 18 August 2008 in Chapman & Hall/CRC Data Mining and Knowledge Discovery Series |
PKI — Panacea or Silver Bullet? JOURNAL ARTICLE published December 2000 in Information Security Technical Report |
Security for the Third Generation (3G) Mobile System JOURNAL ARTICLE published September 2000 in Information Security Technical Report |
Distributed security services in Microsoft Windows 2000 (Windows NT 5.0) — protecting data in the enterprise JOURNAL ARTICLE published January 1999 in Information Security Technical Report |
Distributed security services in Microsoft Windows 2000 (Windows NT 5.0: Protecting data in the enterprise JOURNAL ARTICLE published January 1998 in Information Security Technical Report |
Addressing Online Identity: Understanding the Microsoft Passport Service JOURNAL ARTICLE published September 2002 in Information Security Technical Report |
DETECTING CONSTRUCT‐IRRELEVANT VARIANCE IN AN OPEN‐ENDED, COMPUTERIZED MATHEMATICS TASK JOURNAL ARTICLE published December 2000 in ETS Research Report Series |
Report Highlights JOURNAL ARTICLE published January 2000 in Information Security Technical Report |
Report Highlights JOURNAL ARTICLE published September 2000 in Information Security Technical Report |
Report Highlights JOURNAL ARTICLE published June 2000 in Information Security Technical Report |
Report Highlights JOURNAL ARTICLE published December 2000 in Information Security Technical Report |
Introduction JOURNAL ARTICLE published January 2000 in Information Security Technical Report |
Clustering with Balancing Constraints BOOK CHAPTER published 18 August 2008 in Chapman & Hall/CRC Data Mining and Knowledge Discovery Series |
Introduction JOURNAL ARTICLE published September 2000 in Information Security Technical Report |
Introduction JOURNAL ARTICLE published June 2000 in Information Security Technical Report |
Identrus — the ‘Technical Platform’ JOURNAL ARTICLE published December 2000 in Information Security Technical Report |
Neural networks for seismic wavelet extraction and clustering PROCEEDINGS ARTICLE published January 2000 in SEG Technical Program Expanded Abstracts 2000 |
Windows 2000 Security: A Balanced View JOURNAL ARTICLE published January 2000 in Information Security Technical Report |
JOURNAL ARTICLE published 2000 in Plant and Soil |
Introduction JOURNAL ARTICLE published December 2000 in Information Security Technical Report |