1
Pubblicazione 2013
Sommario: ...- and Learning-Based Framework for Security Anomaly Detection -- Enhancing Model Driven Security through Pattern...
Testo
Elettronico eBook
2
Pubblicazione 2012
Sommario: ... Security Constraints -- Customizing protocol specifications for detecting resource exhaustion and guessing...
Testo
Elettronico eBook
3
Pubblicazione 2005
Sommario: ... Algorithm for Geoscientific Modelling -- Evaluating Methods for Interpolating Continuous Surfaces from...
Testo
Elettronico eBook
4
Pubblicazione 2005
Sommario: ... Programs -- Specification and Verification of Encapsulation in Java Programs -- Detecting Errors...
Testo
Elettronico eBook
5
Pubblicazione 2010
Sommario: ... Sequential Patterns in Wireless Cellular Networks -- Agile Software Development Methods and its Advantages...
Testo
Elettronico eBook
6
Pubblicazione 2015
Sommario: ... Processing To Extract poly(A) Sites -- Analysis of poly(A) Site Choice Using A Java-Based Clustering...
Testo
Elettronico eBook
7
Sommario: ...Introduction -- Automatic Thresholding -- Filters for Color Images -- Edge Detection in Color...
Testo
Elettronico eBook
8
Pubblicazione 2014
Sommario: ...: model, detection, deblurring -- Software support for Common Criteria security development process...
Testo
Elettronico eBook
9
Pubblicazione 2015
Sommario: ... -- An Intelligent Method for Moving Object Detection -- Prediction of Monthly Rainfall in Tamil Nadu using MSARIMA...
Testo
Elettronico eBook
10
Pubblicazione 2007
Sommario: ... Verification -- Software Bugs Seen from an Industrial Perspective or Can Formal Methods Help on Automotive...
Testo
Elettronico eBook
11
Pubblicazione 2010
Sommario: ...Keynote 1 -- Code Roots -- Programming Environments and Tools -- Detecting Missing Method Calls...
Testo
Elettronico eBook
12
Pubblicazione 2008
Sommario: ... Process Specification -- A Method to Find Learner’s Key Characteristic in Wed-Based Learning -- Computer...
Testo
Elettronico eBook
13
Pubblicazione 2011
Sommario: ... -- A comparison of dataflow and mutation testing of Java methods -- A new three levels context based...
Testo
Elettronico eBook
14
Pubblicazione 2005
Sommario: ... -- Representing Human Spatial Behavior by Self-Organizing Networks -- Multi-Agent System Development Kit...
Testo
Elettronico eBook
15
Pubblicazione 2010
Sommario: ... for the Development of Quality-Driven Model Transformations -- Early Deviation Detection in Modeling Activities of MDE...
Testo
Elettronico eBook
16
Pubblicazione 2008
Sommario: ... -- Collaborative architecture for malware detection and analysis -- Realizing Stateful Public Key Encryption...
Testo
Elettronico eBook
17
Pubblicazione 2010
Sommario: ... Quality Perception -- An Offline Fuzzy Based Approach for Iris Recognition with Enhanced Feature Detection...
Testo
Elettronico eBook
18
Pubblicazione 2015
Sommario: ... Scene Detection from Lifelog Videos -- A Procedure for the Development of Mobile Applications Software...
Testo
Elettronico eBook
19
Pubblicazione 2015
Sommario: ... and References Escape on Java Program Analysis -- Preliminary Evaluation of a Software Security Learning...
Testo
Elettronico eBook
20
di Shankar, A. Udaya., Shankar, A. Udaya.
Pubblicazione 2013
Sommario: ... -- Distributed Lock Service -- Distributed Lock using Timestamps -- Channel with Termination Detection Service...
Testo
Elettronico eBook