dtm
Risk base approach for security management fujitsu-fms event 15 aug 2011
The dawn of big data
The embedded systems Model
Cisco Systems The Supply Chain Story
History
Anomaly Detection Using Data Mining Techniques, SMU CSE ...
Architectural Styles and Case Studies, Software architecture ,unit–2
Sandrine RATH, Christiane ARBOGAST and Patrick DELECRAZ: Two approaches to improve the knowledge of people in the “Relais emploi” of STRASBOURG
3. use of ict in time management
ASP.NET Session 3
Big Data for Big Power: How smart is the grid if the infrastructure is stupid?