Search

Your search keyword '"Jarraya, A"' showing total 187 results

Search Constraints

Start Over You searched for: Author "Jarraya, A" Remove constraint Author: "Jarraya, A" Database Springer Nature eBooks Remove constraint Database: Springer Nature eBooks
187 results on '"Jarraya, A"'

Search Results

1. On Divergence-Free Neural ODE for Classification

2. Greater Trochanteric Pain Syndrome (GTPS)

3. A Hybrid Approach Using 2D CNN and Attention-Based LSTM for Parkinson’s Disease Detection from Video

4. Artificial Recharge of Groundwater in Tunisia: A Long and Fruitful Experience

5. Interface Behavior When Drilling GFRP/Al-Based Composites: Temperature Analysis

6. Numerical Investigation of Thermomechanical Damage in CFRP Composites

7. Dynamic Modelling of High-Speed Spindle Supported by Active Magnetic Bearings in Presence of Defects

8. CNN-Based Face Emotion Detection and Mouse Movement Analysis to Detect Student’s Engagement Level

9. VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack

10. MLFM: Machine Learning Meets Formal Method for Faster Identification of Security Breaches in Network Functions Virtualization (NFV)

11. Characterization of Brain Activity Patterns Across States of Consciousness Based on Variational Auto-Encoders

12. Interpretable Signature of Consciousness in Resting-State Functional Network Brain Activity

13. Combined Approach for Modeling Progressive Damage in Unidirectional CFRP Composites

14. AMI-Class: Towards a Fully Automated Multi-view Image Classifier

16. Proactive Security Auditing in Clouds

17. Runtime Security Policy Enforcement in Clouds

18. User-Level Runtime Security Auditing for the Cloud

19. Auditing Virtual Network Isolation Across Cloud Layers

20. Auditing Security Compliance of the Virtualized Infrastructure

21. Literature Review

22. Introduction

24. Abnormal Events and Behavior Detection in Crowd Scenes Based on Deep Learning and Neighborhood Component Analysis Feature Selection

25. Conclusion

28. Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement

29. iCAT: An Interactive Customizable Anonymization Tool

30. Cloud Security Auditing: Major Approaches and Existing Challenges

33. Watchful-Eye: A 3D Skeleton-Based System for Fall Detection of Physically-Disabled Cane Users

35. Stealthy Probing-Based Verification (SPV): An Active Approach to Defending Software Defined Networks Against Topology Poisoning Attacks

36. Groundwater Flow Modelling of a Multilayer Aquifer in Semi-arid Context

37. Pathology of the Rectus Femoris

38. Adductor Muscles Injuries

41. LeaPS: Learning-Based Proactive Security Auditing for Clouds

42. Graph Embedding Through Probabilistic Graphical Model Applied to Symbolic Graphs

43. Improving Fuzzy Multilevel Graph Embedding Technique by Employing Topological Node Features: An Application to Graphics Recognition

45. Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStack

46. FSCEP: A New Model for Context Perception in Smart Homes

47. A Mobile-Based Obstacle Detection Method: Application to the Assistance of Visually Impaired People

48. Introduction

Catalog

Books, media, physical & digital resources