336 results on '"Jonker W"'
Search Results
2. Experimenting NUMA for Scaleable CDR Processing
3. Modeling and Retrieving Audiovisual Information - A Soccer Video Retrieval System
4. Binary biometrics: an analytic framework to estimate the performance curves under Gaussian assumption
5. 5th National Audit Project (NAP5) on accidental awareness during general anaesthesia: summary of main findings and risk factors†‡
6. 5th National Audit Project (NAP5) on accidental awareness during general anaesthesia: protocol, methods, and analysis of data† ‡
7. 5th National Audit Project (NAP5) on accidental awareness during general anaesthesia: patient experiences, human factors, sedation, consent, and medicolegal issues†‡
8. The 5th National Audit Project (NAP5) on accidental awareness during general anaesthesia: patient experiences, human factors, sedation, consent and medicolegal issues
9. The 5th National Audit Project (NAP5) on accidental awareness during general anaesthesia: protocol, methods and analysis of data
10. The 5th National Audit Project (NAP5) on accidental awareness during general anaesthesia: summary of main findings and risk factors
11. Who operates when, where and on whom? A survey of anaesthetic-surgical activity in Ireland as denominator of NAP5*
12. A national survey (NAP5-Ireland baseline) to estimate an annual incidence of accidental awareness during general anaesthesia in Ireland
13. A national survey of anaesthetists (NAP5 Baseline) to estimate an annual incidence of accidental awareness during general anaesthesia in the UK†
14. Experimenting NT Cluster Technology for Massive CDR Processing
15. Modeling and Retrieving Audiovisual Information - A Soccer Video Retrieval System
16. Privacy implications of privacy settings and tagging in Facebook
17. Conjunctive Wildcard Search over Encrypted Data
18. Watermarking for adaptive streaming protocols
19. Private sharing of IOCs and sightings
20. Strong authentication with physical unclonable functions
21. DRM for protecting personal content
22. Performance analysis of the adaptive secondary mirror for the UH2.2 telescope
23. Publicly Verifiable Private Aggregation of Time-Series Data
24. Reliably determining data leakage in the presence of strong attackers
25. Effect-directed analysis supporting monitoring of aquatic environments — An in-depth overview
26. Security, Privacy and Trust: From Innovation Blocker to Innovation Enabler
27. Secure Data Management : 10th VLDB workshop, SDM 2013, Trento, Italy, August 30, 2013. Proceedings
28. Privacy-preserving verification of clinical research
29. Kolloidchemie und Phasenlehre
30. Kolloidchemie und Phasenlehre
31. Towards trustworthy health platform cloud
32. Naar een kloppend hart: Gebruik en waardering van de buitenruimte in Hart van Zuid
33. Secure data management : 8th VLDB workshop, SDM 2011 Seattle, WA, USA, September 2, 2011 : proceedings
34. Purpose Control: Did You Process the Data for the Intended Purpose?
35. Blood plasma sample preparation method to determine thyroid hormone-disrupting compounds in Effect-Directed Analysis
36. 5th National Audit Project (NAP5) on Accidental Awareness During General Anaesthesia
37. Secure data management : 7th VLDB workshop, SDM 2010 Singapore, September 17, 2010 : proceedings
38. Het Europeesrechtelijk kader voor financiële instrumenten ter stimulering van energietransitie
39. Computationally Efficient Searchable Symmetric Encryption
40. Preface (Special issue on Secure data management)
41. Secure data management : 6th VLDB workshop, SDM 2009 Lyon, France, August 28, 2009 : proceedings
42. Secure data management : 5th VLDB workshop, SDM 2008, Auckland, New Zealand, August 24, 2008 : proceedings
43. Enhancing Privacy for Digital Rights Management
44. Secure data management : 4th VLDB workshop, SDM 2007, Vienna, Austria, September 23-24, 2007 : proceedings
45. Ethical dimensions of security, privacy and trust
46. Privacy and security issues in a digital world
47. Different Search Strategies on Encrypted Data Compared
48. A spatio-temporal and a probabilistic approach for video retrieval
49. Client-server trade-offs in secure computation
50. Multimodal content-based video retrieval
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.