1
by Hudson, Shane., Hudson, Shane.
Published 2014
Subjects: ...Web Development. https://scigraph.springernature.com/ontologies/product-market-codes/I29050...
View full text
Electronic eBook
2
Subjects: ...Web Development. https://scigraph.springernature.com/ontologies/product-market-codes/I29050...
View full text
Electronic eBook
3
Subjects: ...Game Development. https://scigraph.springernature.com/ontologies/product-market-codes/I29040...
View full text
Electronic eBook
4
Subjects: ...Game Development. https://scigraph.springernature.com/ontologies/product-market-codes/I29040...
View full text
Electronic eBook
5
Table of Contents: ... Unreliable Channels -- Programs, Semantics and Effective Atomicity -- Implements and Compositionality -- SESF...
View full text
Electronic eBook
6
Published 2010
Table of Contents: ...Keynote 1 -- Code Roots -- Programming Environments and Tools -- Detecting Missing Method Calls...
View full text
Electronic eBook
7
Published 2013
Table of Contents: ... for the Java Virtual Machine -- Averroes: Whole-Program Analysis without the Whole Program -- QUIC Graphs...
View full text
Electronic eBook
8
Published 2005
Table of Contents: ... in Exploiting Dependent And-Parallelism in Logic Programming: Leftness Detection in Dynamic Search Trees...
View full text
Electronic eBook
9
Published 2005
Table of Contents: ... Programming -- The Emergent Structure of Development Tasks -- Java -- Loosely-Separated “Sister” Namespaces...
View full text
Electronic eBook
10
Published 2015
Table of Contents: ... Evaluation for Java Malware Detection -- Access control and obligations in the category-based metamodel: a...
View full text
Electronic eBook
11
Table of Contents: ... and Contours -- Corner Detection -- Detecting Simple Curves -- Morphological Filters -- Regions in Binary...
View full text
Electronic eBook
12
Published 2010
Table of Contents: ... Linear Algebra, Computer Programming and Biochemistry Curriculum -- Adaptive Assessments using Open...
View full text
Electronic eBook
13
Published 2012
Table of Contents: ... Security Constraints -- Customizing protocol specifications for detecting resource exhaustion and guessing...
View full text
Electronic eBook
14
Published 2010
Table of Contents: ... Analysis -- Shape Refinement through Explicit Heap Analysis -- Memory Leaks Detection in Java by Bi...
View full text
Electronic eBook
15
Published 2008
Table of Contents: ... -- Contextual Integration Testing of Classes -- An Automatic Verifier for Java-Like Programs Based on Dynamic...
View full text
Electronic eBook
16
Published 2005
Table of Contents: ... Programs -- Specification and Verification of Encapsulation in Java Programs -- Detecting Errors...
View full text
Electronic eBook
17
Published 2010
Table of Contents: ... Java Program -- Keynote 3 -- Disciplined Heterogeneous Modeling -- Design Guidelines...
View full text
Electronic eBook
18
Published 2010
Table of Contents: ... -- Program Verification in SPARK and ACSL: A Comparative Case Study -- Static Versioning of Global State...
View full text
Electronic eBook
19
Published 2008
Table of Contents: ...A New Approach to Memory Partitioning in On-Board Spacecraft Software -- Design and Development...
View full text
Electronic eBook
20
Published 2008
Table of Contents: ... Tools -- Towards a Worldwide Verification Technology -- It Is Time to Mechanize Programming Language...
View full text
Electronic eBook