Affichage de 1–16 sur 32 résultats
-

AI and IP law
Download -

Asymmetric Cryptography
Download -

Back-End-Data-Sharing Model
Download -

Beyond 3G Networks
Download -

Classical computer memories
Download -

Computer Aided Engineering Techniques
Download -

Connection to the single-board computers as remote nodes
Download -

Cooperative Game Theory (CGT) and EE
Download -

Cryptographic Primitives
Download -

Cybersecurity Awareness
Download -

Efficient use of computer power : convex optimisation
Download -

Granular Computing
Download -

Hardware Virtualization
Download -

History of Cryptography
Download -

Homomorphic Encryptions
Download -

Identifying installed Apps
Download