1
Published 2008
Table of Contents: ... of Abstraction -- Fining Active Membership Functions in Fuzzy Data Mining -- A Compressed Vertical Binary...
View full text
Electronic eBook
2
by Cervo, Dalton, 1967-.
Published 2011
Subjects: ...Customer relations Data processing....
Book
3
Published 2008
Table of Contents: ... in P2P Anonymity Schemes -- An Efficient Deniable Key Exchange Protocol (Extended Abstract...
View full text
Electronic eBook
4
Published 2008
Table of Contents: ... for Auditing SQL Queries -- A New Approach to Secure Logging -- Keynote -- Security, Functionality and Scale...
View full text
Electronic eBook
5
Published 2005
Table of Contents: ... Engineering Practice in Lithuanian Software Development Companies -- Functionality of Information Systems...
View full text
Electronic eBook
6
Published 2015
Table of Contents: ... -- Data, Information and Knowledge Engineering -- Adaptively Approximate Techniques in Distributed...
View full text
Electronic eBook
7
Published 2008
Table of Contents: ...An Implicit Complexes Framework for Heterogeneous Objects Modelling -- Heterogeneous Object Design...
View full text
Electronic eBook
8
Published 2007
Table of Contents: ...-Boolean Functions -- EasyAnalyzer: An Object-Oriented Framework for the Experimental Analysis...
View full text
Electronic eBook
9
Published 2008
Table of Contents: ...1. ABZ Invited Talks -- Complex Hardware Modules Can Now be Made Free of Functional Errors without...
View full text
Electronic eBook
10
Published 2014
Table of Contents: ... Announcement: A Practical Transactional Memory Interface -- Brief Announcement: On Dynamic and Multi-functional...
View full text
Electronic eBook
11
Published 2015
Table of Contents: ... as an Abstract Data Type -- Type-Based Allocation Analysis for Co-recursion in Lazy Functional Languages -- Type...
View full text
Electronic eBook
12
Published 2014
Table of Contents: ... -- Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited -- Hash Functions -- Differential Biases in Reduced...
View full text
Electronic eBook
13
Published 2012
Table of Contents: ... Hard-to-Invert Leakage -- Completeness for Symmetric Two-Party Functionalities - Revisited...
View full text
Electronic eBook
14
Published 2005
Table of Contents: ...Genetic Programming: Theory and Practice -- Discovering Financial Technical Trading Rules Using...
View full text
Electronic eBook
15
Published 2007
Table of Contents: ... for Runtime Code Update -- Automata-Based Confidentiality Monitoring -- Efficient and Practical Control Flow...
View full text
Electronic eBook
16
Published 2006
Table of Contents: ... Better Answer A New Approach to Private Data Analysis -- Beauty and the Beast: The Theory and Practice...
View full text
Electronic eBook
17
Published 2013
Table of Contents: ... and Algorithms for Joins via Fractional Edge Covers -- Incremental Data Fusion Based on Provenance Information...
View full text
Electronic eBook
18
Published 2008
Table of Contents: ... -- New Results on the Key Scheduling Algorithm of RC4 -- Cryptographic Hash Functions -- Two Attacks...
View full text
Electronic eBook
19
Table of Contents: ... -- Chap. 11 Elliptic Curve Cryptography -- App. A Some Maple Conversion Functions -- Acronyms...
View full text
Electronic eBook
20
Published 2015
Table of Contents: ...Data Mining -- Improvement of the multiple-view learning based on the self-organizing Maps...
View full text
Electronic eBook