23 results on '"Ziyad S"'
Search Results
2. A propagation model of a vulnerability mitigation computer worm - seawave.
3. A link-layer-based self-replicating vulnerability discovery agent.
4. Security and Performance Aspects of an Agent-Based Link-Layer Vulnerability Discovery Mechanism.
5. Semi-autonomous Link Layer Vulnerability Discovery and Mitigation Dissemination.
6. Realistic Reflections and Refractions on Graphics Hardware with Hybrid Rendering and Layered Environment Maps.
7. Parameterized environment maps.
8. Parameterized Animation Compression.
9. The Design and Analysis of a Cache Architecture for Texture Mapping.
10. Scalable Variants of Multipole-based Algorithms for Molecular Dynamics Applications.
11. Agent-Based Host Enumeration and Vulnerability Scanning Using Dynamic Topology Information.
12. Performance Evaluation of Contrast Enhancement Techniques in Computed Tomography of Lung Images
13. A propagation model of a vulnerability mitigation computer worm - seawave
14. Threat analysis model of an agent-based vulnerability mitigation mechanism using Bayesian Belief Networks
15. Energy transfer processes in a polymer laser
16. Agent-based host enumeration and vulnerability scanning using dynamic topology information
17. A link-layer-based self-replicating vulnerability discovery agent
18. Security and Performance Aspects of an Agent-Based Link-Layer Vulnerability Discovery Mechanism
19. Energy transfer processes in a polymer laser.
20. A link-layer-based self-replicating vulnerability discovery agent.
21. Parameterized environment maps
22. Parameterized environment maps.
23. The design and analysis of a cache architecture for texture mapping
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.