- Presentations
- Documents
- Infographics
Philosophy of Deep Learning
Melanie Swan
•
7 years ago
Deep learning - A Visual Introduction
Lukas Masuch
•
8 years ago
On the Ground Validation of Online Diagnosis with Twitter and Medical Records
Wei-Yuan Chang
•
8 years ago
Notes on Spectral Clustering
Davide Eynard
•
11 years ago
Approaches to real time scheduling
Kamal Acharya
•
6 years ago
Real time scheduling - basic concepts
Student
•
9 years ago
Managing Personally Identifiable Information (PII)
KP Naidu
•
12 years ago
Intrusion detection system
Aparna Bhadran
•
10 years ago
Five Major Types of Intrusion Detection System (IDS)
david rom
•
7 years ago
Transport layer security
Hrudya Balachandran
•
10 years ago
Transport layer security (tls)
Kalpesh Kalekar
•
8 years ago
Pgp pretty good privacy
Pawan Arya
•
8 years ago
IPSec VPN & IPSec Protocols
NetProtocol Xpert
•
7 years ago
Internet security association and key management protocol (isakmp)
CAS
•
6 years ago
Internet Key Exchange Protocol
Prateek Singh Bapna
•
11 years ago
HCI - Chapter 3
Alan Dix
•
15 years ago
Embedded System Tools ppt
Halai Hansika
•
10 years ago
Software estimation
Md Shakir
•
10 years ago
Decision Tree Ensembles - Bagging, Random Forest & Gradient Boosting Machines
Deepak George
•
8 years ago
Support Vector Machines
nextlib
•
16 years ago