1
Published 2008
Table of Contents: ... in Vehicles -- Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data -- Security...
View full text
Electronic eBook
2
Published 2008
Table of Contents: ...Keynote Addresses -- Extreme Computing on the Distributed European Infrastructure...
View full text
Electronic eBook
3
Published 2014
Table of Contents: ...Visual Dictionary Pruning Using Mutual Information and Information Gain -- Mining Telecommunication...
View full text
Electronic eBook
4
Published 2008
Table of Contents: ... Transmitter: A Fast Design Cycle Using OFDM Framework in Bluespec -- SoC -- A Real-Time Programming Model...
View full text
Electronic eBook
5
Published 2014
Table of Contents: ...-organized Learning in Software Factory: Experiences and Lessons Learned -- Part Methods and Metrics -- Using...
View full text
Electronic eBook
6
Published 2014
Table of Contents: ... Grid -- Network Selection Mechanism for Future Generation Network Using Game Theory Model -- Research...
View full text
Electronic eBook
7
Published 2008
Table of Contents: ... of Trivium -- Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical...
View full text
Electronic eBook
8
Published 2008
Table of Contents: ... Requirements -- Cryptanalysis -- Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box...
View full text
Electronic eBook
9
by Jalote, Pankaj., Jalote, Pankaj.
Published 2005
Table of Contents: ... -- Programming Principles and Guidelines -- Testing Methodologies -- Defect Analysis and Prevention....
View full text
Electronic eBook
10
Published 2007
Table of Contents: ... -- Visualization of Five Erosion Risk Classes using Kernel Discriminants -- Computer Security and Safety...
View full text
Electronic eBook
11
Published 2012
Table of Contents: ... Using ηT Pairing over GF(397) -- On the (Im)possibility of Projecting Property in Prime-Order Setting...
View full text
Electronic eBook
12
Published 2014
Table of Contents: ... for Mathematical Theory Exploration -- New Approaches in Black Box Group Theory -- A GAP Package for Computing...
View full text
Electronic eBook
13
Published 2008
Table of Contents: ... Programming System Using Imitation -- Embodiment and Perceptual Crossing in 2D -- Navigation and Internal...
View full text
Electronic eBook
14
Published 2013
Table of Contents: ... in Metallic Samples Using Chaos Theory -- Computational Representation of Porous Media Features (Porosity...
View full text
Electronic eBook