Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
exploiting programming » exploring programming, evaluating programming, existing programming
coverage exploiting » cameras exploiting, provenance exploiting, arbitrage exploiting
programming program » programming programmed, programming problem, programming problems
program computing » program comparing, programs compiling, problem computing
https » http
exploiting programming » exploring programming, evaluating programming, existing programming
coverage exploiting » cameras exploiting, provenance exploiting, arbitrage exploiting
programming program » programming programmed, programming problem, programming problems
program computing » program comparing, programs compiling, problem computing
https » http
1
Subjects:
“...Computational Intelligence. https://scigraph.springernature.com/ontologies/product-market-codes...”
View full text
View full text
Electronic
eBook
2
Published 2012
Table of Contents:
“... -- SmartTestGen+: A Test Suite Booster for Enhanced Structural Coverage -- Model Checking under Fairness in ProB...”View full text
Electronic
eBook
3
Published 2008
Table of Contents:
“... with Embedded Context Using Model Checker -- Requirements Coverage as an Adequacy Measure for Conformance...”View full text
Electronic
eBook
4
Published 2008
Table of Contents:
“... Procedures for CP-Based Random Test Generation -- Using Virtual Coverage to Hit Hard-To-Reach Events...”View full text
Electronic
eBook
5
Published 2014
Table of Contents:
“... for contextualized decision support in e-health applications -- Computing the context effect for science learning...”View full text
Electronic
eBook
6
Published 2008
Table of Contents:
“... Structure Theory -- Exploiting Ontological Structure for Complex Preference Assembly -- Constraints -- A...”View full text
Electronic
eBook
7
Published 2007
Table of Contents:
“... Based and ABC Supported QoS Unicast Routing Scheme -- Algorithms for the m-Coverage Problem and k...”View full text
Electronic
eBook
8
Published 2006
Table of Contents:
“... Computing -- Exploiting Eye Gaze Information for Operating Services in Home Network System -- A Methodology...”View full text
Electronic
eBook
9
Published 2010
Table of Contents:
“...Tables: A Spreadsheet-Inspired Programming Model for Sensor Networks -- Optimized Java Binary...”View full text
Electronic
eBook
10
Published 2008
Table of Contents:
“... -- Recognition -- Learning to Localize Objects with Structured Output Regression -- Beyond Nouns: Exploiting...”View full text
Electronic
eBook
11
Published 2005
Table of Contents:
“...-optimizing Systems -- Exploiting Hub States in Automatic Verification -- Combined Methods -- An Approach...”View full text
Electronic
eBook
12
by Muller, Jean-Michel., Muller, Jean-Michel., Brisebarre, Nicolas., de Dinechin, Florent., Jeannerod, Claude-Pierre., Lefèvre, Vincent., Melquiond, Guillaume., Revol, Nathalie., Stehlé, Damien., Torres, Serge.
Published 2010
Subjects:
“...Programming languages (Electronic computers)....”Published 2010
View full text
Electronic
eBook
13
by Dewson, Robin., Dewson, Robin., Machanic, Adam., Narkiewicz, Jan D., Rizzo, Thomas., Sack, Joseph., Walters, Robert., Skinner, Julian., Davidson, Louis.
Published 2006
Table of Contents:
“... for Developers -- T-SQL Enhancements for DBAs -- .NET Integration -- Programming Assemblies -- SQL Server and XML...”Published 2006
View full text
Electronic
eBook
14
Table of Contents:
“... Programming -- .NET Client Programming -- HTTP Endpoints....”
View full text
View full text
Electronic
eBook
15
Published 2008
Table of Contents:
“... -- Extracting Evidence Using Google Desktop Search -- Evaluation of Registry Data Removal by Shredder Programs...”View full text
Electronic
eBook
16
Published 2011
Table of Contents:
“... Based on Network Equivalent -- Effective Coverage Area Based on Call Dropping Probability of Next...”View full text
Electronic
eBook
17
Published 2007
Table of Contents:
“... Coverage in Healthcare Using Policy Refinement -- Positon Papers -- Requirements of Secure Storage Systems...”View full text
Electronic
eBook
18
Published 2005
Table of Contents:
“... -- Periodicity-Based Temporal Constraints -- A Survey of Problem Difficulty in Genetic Programming -- Intelligent...”View full text
Electronic
eBook
19
Published 2013
Table of Contents:
“... -- Diversifying Tag Selection Result for Tag Clouds by Enhancing both Coverage and Dissimilarity -- Community...”View full text
Electronic
eBook
20
Published 2010
Table of Contents:
“... -- (Meta) Analysis of Digital Libraries -- An Analysis of the Evolving Coverage of Computer Science Sub...”View full text
Electronic
eBook



