About 55 item dissertation in line with pattern match query results,the following is 1 to 50(Search took 0.049 seconds)
- The Query Research Based on Reachability of Uncertain Graph,DiQiuZuo/Harbin Institute of Technology,0/41
- Study on Distributed Instruswn Detection System Based on Military Network,ZouLuoSheng/Xi'an University of Electronic Science and Technology,0/9
- The Desing and Implementation of Intrusion Detection System for Ndc in Ctt,LvLiangCheng/Beijing University of Posts and Telecommunications,0/12
- Design for manufacturability (DFM) analysis and practical method of matching key figure,CaiJun/Fudan University,0/16
- The Design of Automatic Positioning Punching Machine Based on Machine Vision,ZhangShiLing/Chengdu University of Technology,0/99
- A Robotic Visual Servoing System with Stereo Vision Based on Parallel Processing,LiGe/Harbin Institute of Technology,0/775
- Research and Implementation on Spatial Relation,ZhaoHongChao/Institute of Computing Technology,11/598
- Design and Implementation of Pattern Match Chip Used in UTM Acceleration,JiangHui/Zhejiang University,1/57
- Research and Design of Distributed Intrusion Detection System,TangJie/Nanjing University of Information Engineering,0/152
- Application of Image Processing in Target Detection System,LiXiaoDa/Changchun University of Science and Technology,1/200
- Research on Mobility Pattern of Objects in Road Network,HuWeiFeng/Hohai University,0/46
- The Design and Realization of the High Performance Pattern Matching Components Based on the Misuse Intrusion Detection System,LiJianHui/Hunan University,0/92
- Distributed Intrusion Detection and Attack-Tracing System in Windows,ZuoLong/Southwest Jiaotong University,2/211
- The Study of Distributed Intrusion Detection System Model,LiuPingPing/Jilin University,0/255
- Research and Implementation of network denial of service attack detection system,ZhangHaiFeng/Dalian University of Technology,0/192
- WAN Implementation of Intrusion Detection System,GuoLing/Kunming University of Science and Technology,2/127
- Research of a Distributed Intrusion Detection Based on AGLET Mobile Agent Technology,XuGuoQin/Liaoning Technical University,4/174
- Network monitoring and intrusion detection systems technology research,YeLi/Chengdu University of Technology,5/443
- BMH algorithm based on improved Intrusion Detection System,GouShaoBo/Kunming University of Science and Technology,0/113
- Research of Polymorphic Worm Automatic Detection Technology,LiuYuanXun/Shandong University,6/198
- The Study on Evolution of the Regional Innovation System,WuGuoBin/Wuhan University of Technology,1/427
- The Design and Implementation of Intrusion Detection System for MAN,HuangZhuoHua/Chongqing University,1/135
- The Design and Implementation of Distributed Intrusion Detection System,ZhaoYiQing/Shandong University,2/149
- High-speed network intrusion detection system,ShengHui/Shandong University,5/161
- Research and Implementation of intrusion detection system based on the TCP / IP protocol analysis,SongDongHua/University of Electronic Science and Technology,3/323
- The Study and Implementation of Distributed Intrusion Detection System,WuSiWei/Northeastern University,2/155
- Research and Implementation of Detection System with Distributed Denial of Service Attack,YangHui/Shenyang University of Technology,0/137
- The Research and Design of IDS Based on TCP/IP,CaiShenXin/Shenyang University of Technology,1/123
- Research on Web Information Extraction Applied to Chinese Name Search Engine,WangYing/Lanzhou University,2/188
- Studies on Network Intrusion Detection Technology Based on Protocol Analysis,LiuYanChang/Xi'an University of Architecture and Technology,4/169
- Find in a high - speed secure routers algorithm,YuanYingTing/Zhejiang University,0/140
- Research on and Realize the Network Intrusion Detection System Based on Pattern Matching,ChenPeng/Hunan University,0/217
- Campus Network Intrusion Detection System Research and Implementation,FangXianJin/Anhui University,9/467
- Design based on protocol analysis intrusion detection system to achieve,HuBaoGang/Shandong University,5/374
- Study and Application of Protocol Analysis Technology-Based Intrusion Detection,WangXiuFang/Shandong University of Science and Technology,11/356
- Intrusion Detection System Based on NDIS,JingShouBo/Qingdao University,4/174
- Study on Network Intrusion Detection System Based on Outliers Mining,PengXuYou/Xi'an University of Architecture and Technology,0/144
- Study on high speed network intrusion rule matching algorithm in detecting system,HuMin/Northwestern Polytechnical University,1/199
- The Design and Implementation of Event Analyzer of Distributed Network Intrusion Detection System,XiaoShuChao/Huazhong University of Science and Technology,3/128
- The Design and Implementation of Deep HTTP Packet Parsing & Extraction Engine,ZhaoYu/Huazhong University of Science and Technology,0/108
- Research of Intrusion Detection Method and Its Implementation in IDS,GeBin/National University of Defense Science and Technology,1/242
- Study about Intrusion Detection System on the Basis of Protocol Analysis,XuJian/Chongqing University,4/352
- Based on pattern matching network intrusion detection system - MIDS Design and Implementation,YaoZuo/University of Electronic Science and Technology,7/188
- Mobile platform under the Chinese text content filtering technology research and implementation,ChenXin/University of Electronic Science and Technology,2/179
- Fingerprint Automation Identification System Based on FPGA,WengWenTian/Donghua University,2/243
- Design and Implementation of DNS Detection System Based on Network Information,ZhengHaiTao/Beijing Jiaotong University,3/156
- Applied Research on Distributed Intrusion Detection Technology in the Campus Network,LiuYing/Hefei University of Technology,3/181
- The Design of Auto-inspection System of Electronic Component Package,WangChao/Tianjin University,0/90
- Design and Implement of Ic Leads Inspection System for A Semiconductor Enterprise,TangXiaoYan/Suzhou University,1/16
- Research on Pattern Match Algorithm in Rule Engine and Application for Rule Engine,TongYi/Beijing University of Posts and Telecommunications,4/149
Total 2 Pages First Previous 1 2 Next Last
© 2012 www.DissertationTopic.Net Mobile
|