Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 1 of 145787 results
Sort by: relevance publication year

Using Assignment Constraints to Avoid Empty Clusters in k-Means Clustering

BOOK CHAPTER published 18 August 2008 in Chapman & Hall/CRC Data Mining and Knowledge Discovery Series

Authors: Paul Bradley | Kristin Bennett | Indrajit Bhattacharya

PKI — Panacea or Silver Bullet?

JOURNAL ARTICLE published December 2000 in Information Security Technical Report

Authors: Chris Sundt

Security for the Third Generation (3G) Mobile System

JOURNAL ARTICLE published September 2000 in Information Security Technical Report

Authors: Colin Blanchard

Distributed security services in Microsoft Windows 2000 (Windows NT 5.0) — protecting data in the enterprise

JOURNAL ARTICLE published January 1999 in Information Security Technical Report

Authors: Glenn Pittaway

Distributed security services in Microsoft Windows 2000 (Windows NT 5.0: Protecting data in the enterprise

JOURNAL ARTICLE published January 1998 in Information Security Technical Report

Authors: Glenn Pittaway

Addressing Online Identity: Understanding the Microsoft Passport Service

JOURNAL ARTICLE published September 2002 in Information Security Technical Report

DETECTING CONSTRUCT‐IRRELEVANT VARIANCE IN AN OPEN‐ENDED, COMPUTERIZED MATHEMATICS TASK

JOURNAL ARTICLE published December 2000 in ETS Research Report Series

Authors: Ann Gallagher | Randy Elliot Bennett | Cara Cahalan

Report Highlights

JOURNAL ARTICLE published January 2000 in Information Security Technical Report

Report Highlights

JOURNAL ARTICLE published September 2000 in Information Security Technical Report

Report Highlights

JOURNAL ARTICLE published June 2000 in Information Security Technical Report

Report Highlights

JOURNAL ARTICLE published December 2000 in Information Security Technical Report

Introduction

JOURNAL ARTICLE published January 2000 in Information Security Technical Report

Clustering with Balancing Constraints

BOOK CHAPTER published 18 August 2008 in Chapman & Hall/CRC Data Mining and Knowledge Discovery Series

Authors: Joydeep Ghosh | Ayhan Demiriz

Introduction

JOURNAL ARTICLE published September 2000 in Information Security Technical Report

Authors: Chez Ciechanowicz

Introduction

JOURNAL ARTICLE published June 2000 in Information Security Technical Report

Authors: Chez Ciechanowicz

Identrus — the ‘Technical Platform’

JOURNAL ARTICLE published December 2000 in Information Security Technical Report

Authors: Mark Stirland

Neural networks for seismic wavelet extraction and clustering

PROCEEDINGS ARTICLE published January 2000 in SEG Technical Program Expanded Abstracts 2000

Authors: Kou‐Yuan Huang | Shen‐Pyng Wang

Windows 2000 Security: A Balanced View

JOURNAL ARTICLE published January 2000 in Information Security Technical Report

Authors: Ivan Phillips

JOURNAL ARTICLE published 2000 in Plant and Soil

Authors: Robert L. Bradley | Brian D. Titus | Caroline M. Preston | Jennifer Bennett

Introduction

JOURNAL ARTICLE published December 2000 in Information Security Technical Report

Authors: Chez Ciechanowicz