-
121
C2 secure database management systems
Published 1999Get full text
Get full text
Get full text
Get full text
conferenceObject -
122
Software Metrics for Small Database Applications
Published 2000Get full text
Get full text
Get full text
Get full text
conferenceObject -
123
MUSE Prototype for Music Sentiment Expression
Published 2018Get full text
Get full text
Get full text
Get full text
conferenceObject -
124
-
125
Computer in education. (c1994)
Published 1994Get full text
Get full text
Get full text
masterThesis -
126
-
127
An efficient approach for textual data classification using deep learning
Published 2022“…Textual data contains much useless information that must be pre-processed. …”
-
128
On traffic characteristics and bandwidth requirements of voice over IP applications
Published 2003Get full text
Get full text
Get full text
Get full text
conferenceObject -
129
-
130
Using big data safety analytics for proactive traffic management
Published 2015“…These projects deal with applications of big data analytics in safety and operation. The speech shows examples of UCF research using big data in safety analysis, adverse weather conditions and safety planning. …”
-
131
Efficient Approximate Conformance Checking Using Trie Data Structures
Published 2021“…By encoding the proxy behavior using a trie data structure, we obtain a logarithmically reduced search space for alignment computation compared to a set-based representation. …”
Get full text
Get full text
Get full text
-
132
-
133
DoFP-ML: A Machine Learning Approach to Food Quality Monitoring Using a DoFP Polarization Image Sensor
Published 2020“…This article proposes a non-invasive and non-destructive system for estimating the freshness of apples using polarization images from a Division-of-Focal-Plane (DoFP) polarization camera. …”
-
134
-
135
Assessing the bond strength in thermoplastic fiber composite fabricated by an open mold process
Published 2021Get full text
doctoralThesis -
136
-
137
Bidirectional electronic textile token grid network topology. (c2013)
Published 2013Get full text
Get full text
masterThesis -
138
-
139
Securing wireless networks with enhanced WEP
Published 2006Get full text
Get full text
Get full text
conferenceObject -
140
A three poled model for web applications
Published 2006Get full text
Get full text
Get full text
conferenceObject