1
Published 2006
Table of Contents: ... About Recursive Functions: A Practical Tool for the Coq Proof Assistant -- Soutei, a Logic-Based Trust...
View full text
Electronic eBook
2
Published 2013
Table of Contents: ... and Function Values (D. Noll) -- 27. Convergence of Linesearch and Trust-Region Methods Using the Kurdyka...
View full text
Electronic eBook
3
by Li, Xingfeng., Li, Xingfeng.
Published 2014
Table of Contents: ... -- Activation detection: model free and model based methods -- Models for hemodynamic response function...
View full text
Electronic eBook
4
Published 2010
Table of Contents: ... Trust in Cloud Computing -- SegSlice: Towards a New Class of Secure Programming Primitives...
View full text
Electronic eBook
5
Published 2010
Table of Contents: ...-Performance of Multi-core Processors -- Internet-Based Virtual Computing Environment -- Session 1...
View full text
Electronic eBook
6
Published 2007
Table of Contents: ... and Consensus -- A Functional Programming System SFP: Sisal 3.1 Language Structures Decomposition -- Towards a...
View full text
Electronic eBook
7
Published 2013
Table of Contents: ... Database -- Types, Functional Programming and Atomic Transactions in Hardware Design -- Record Polymorphism...
View full text
Electronic eBook
8
Published 2012
Table of Contents: ... Compute Units -- Relationship-Preserving Change Propagation in Process Ecosystems -- Scheduling Service...
View full text
Electronic eBook
9
Published 2015
Table of Contents: ...Binary Bat Algorithm: On the Efficiency of Mapping Functions When Handling Binary Problems Using...
View full text
Electronic eBook
10
Published 2015
Table of Contents: ... -- Chapter 2: ARM TrustZone -- Computer Security Anchors in Smart Grids: The Smart Metering Scenario...
View full text
Electronic eBook
11
Published 2014
Table of Contents: ... by Phase Tracking using Bilateral Probability Function -- Electrical Network Modeling of Amino Acid String...
View full text
Electronic eBook
12
Published 2006
Table of Contents: ... Authentication Protocol for 3G Mobile Systems Using CSP and Rank Functions -- Attribute-Based Authentication...
View full text
Electronic eBook
13
Published 2007
Table of Contents: ... Residue Binding Propensity and Sequence Entropy -- Use of Parallel Simulated Annealing for Computational...
View full text
Electronic eBook
14
Published 2005
Table of Contents: ... Grid -- Session 1: Grid Computing -- CGSV: An Adaptable Stream-Integrated Grid Monitoring System...
View full text
Electronic eBook
15
Published 2007
Table of Contents: ... Orders -- Tree Components Programming: An Application to XML -- A Framework for Incorporating Trust...
View full text
Electronic eBook
16
Published 2012
Table of Contents: ... of Confidence in Assurance Cases -- An Unified Meta-model for Trustworthy Systems Engineering -- A Preliminary...
View full text
Electronic eBook
17
Published 2010
Table of Contents: ...Trusted and Pervasive Computing -- Foot Shape Analysis of Adult Male in the China -- Intelligent...
View full text
Electronic eBook
18
Published 2010
Table of Contents: ...-Intensive Socially Similar Evolving Community Tracker -- Clustering of Blog Sites Using Collective Wisdom...
View full text
Electronic eBook
19
Published 2006
Table of Contents: ... Optimization of Braced Steel Frameworks Using Genetic Programming -- On the Adoption of Computing...
View full text
Electronic eBook
20
Published 2007
Table of Contents: ... Algorithm Using a Trust-Region Derivative-Free Optimization with Quadratic Modelling for Optimization...
View full text
Electronic eBook