Conference paper
Optimization algorithms for energy-efficient data centers
Hendrik F. Hamann
InterPACK 2013
Knowledge-based techniques have much to offer security practitioners. After brief overviews of these techniques, we review applications described in the literature and suggest others. Applications in other domains that offer insights for security are also described. Requirements for knowledge system tools are discussed in the light of the suggested applications. © 1988.
Hendrik F. Hamann
InterPACK 2013
Rajeev Gupta, Shourya Roy, et al.
ICAC 2006
Michael Ray, Yves C. Martin
Proceedings of SPIE - The International Society for Optical Engineering
Victor Valls, Panagiotis Promponas, et al.
IEEE Communications Magazine