1
Published 2006
Table of Contents: ... for Incremental Evaluation of Tabled Logic Programs -- Functional and Constraint Logic Programming -- Memory Reuse...
View full text
Electronic eBook
2
Published 2006
Table of Contents: ... Evaluation of Tabled Prolog: Beyond Pure Logic Programs....
View full text
Electronic eBook
3
Published 2006
Table of Contents: ...-Based Analysis of Global Function Computation -- Checking a Multithreaded Algorithm with ?+?CAL...
View full text
Electronic eBook
4
Published 2010
Table of Contents: ...) Computations Based on GPU -- Parallel Programming, Performance Evaluation -- A Proposed Asynchronous Object...
View full text
Electronic eBook
5
Published 2012
Table of Contents: ... (Marino M., Palumbo F., Tortora C.) -- Clustering geostatistical functional data (Romano E., Verde R...
View full text
Electronic eBook
6
Published 2006
Table of Contents: ... -- Computation of the Real Zeros of the Kummer Function M(a;c;x) -- Towards Reliable Software for the Evaluation...
View full text
Electronic eBook
7
Published 2010
Table of Contents: ... -- External Authenticated Non-volatile Memory with Lifecycle Management for State Protection in Trusted...
View full text
Electronic eBook
8
Published 2007
Table of Contents: ... -- Defense-in-Depth and Diverse Qualification of Safety-Critical Software -- Experimental Evaluation...
View full text
Electronic eBook
9
Published 2013
Table of Contents: ...A Populated Iterated Greedy Algorithm with Inver-Over Operator for Traveling Salesman Problem...
View full text
Electronic eBook
10
Published 2006
Table of Contents: ... Identification Through Image Evaluation Using Secret Predicates -- Hash Functions -- Cryptanalysis of Reduced...
View full text
Electronic eBook
11
Published 2010
Table of Contents: ...-Order Groups -- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner...
View full text
Electronic eBook
12
Published 2008
Table of Contents: ... for Auditing SQL Queries -- A New Approach to Secure Logging -- Keynote -- Security, Functionality and Scale...
View full text
Electronic eBook
13
Published 2006
Table of Contents: ... for Paillier Encrypted Values -- Information-Theoretic Conditions for Two-Party Secure Function Evaluation...
View full text
Electronic eBook
14
Published 2014
Table of Contents: ...-objective Optimization Approach for Lifetime and Coverage Problem in Wireless Sensor Network -- Evaluation...
View full text
Electronic eBook
15
Published 2010
Table of Contents: ...-Type Lossy Trapdoor Functions -- Digital Signature -- Trapdoor Sanitizable Signatures Made Easy...
View full text
Electronic eBook
16
Published 2012
Table of Contents: ... Annotated Model Solutions in a Functional Programming Tutor -- The Effect of Predicting Expertise in Open...
View full text
Electronic eBook
17
Published 2008
Table of Contents: ... Between External Representations: Does it Enhance Learning with an Intelligent Tutoring Program...
View full text
Electronic eBook
18
Published 2006
Table of Contents: ... Crisis Team Functioning Using Human Simulators -- Information Systems Considerations: Integration...
View full text
Electronic eBook
19
Table of Contents: ... -- Syntax of the population parameters file -- Syntax of the external constraints file -- Writing a...
View full text
Electronic eBook
20
Subjects: ...Engineering Economics, Organization, Logistics, Marketing. https://scigraph.springernature.com...
View full text
Electronic eBook