Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
computing programming » computer programming, computers programming
programming programs » programming program, programming programmed, programming problems
integrals computing » integrated computing, interval computing, integration computing
programs abstract » program abstract, program abstracts, programs abstraction
abstract attacks » abstract traces, abstract trace, abstract aspects
computing programming » computer programming, computers programming
programming programs » programming program, programming programmed, programming problems
integrals computing » integrated computing, interval computing, integration computing
programs abstract » program abstract, program abstracts, programs abstraction
abstract attacks » abstract traces, abstract trace, abstract aspects
1
Published 2008
Table of Contents:
“... and Big Commuting Diagrams (Abstract) -- 2. ASM Papers -- Model Based Refinement and the Tools of Tomorrow...”View full text
Electronic
eBook
2
Published 2015
Table of Contents:
“... with Structural Plasticity: Attacking the Subset Sum Problem -- P Systems with Generalized Multisets over Totally...”View full text
Electronic
eBook
3
Published 2010
Table of Contents:
“... Selection Based on Soft Computing Techniques -- Obtaining the Compatibility between Musicians Using Soft...”View full text
Electronic
eBook
4
Published 2007
Table of Contents:
“... -- A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols -- An Abstraction...”View full text
Electronic
eBook
5
Published 2012
Table of Contents:
“... attacks -- ving the Usability of Specification Languages and Methods for Annotation-based Verification...”View full text
Electronic
eBook
6
Published 2014
Table of Contents:
“... Theories via Implicit Predicate Abstraction -- SMT-Based Verification of Software Countermeasures against...”View full text
Electronic
eBook
7
Published 2010
Table of Contents:
“... Classification Rules with Gene Expression Programming: A Preliminary Study -- Solving Classification Problems...”View full text
Electronic
eBook
8
Published 2010
Table of Contents:
“... of Genetic Programming Evolved Classifier Expressions Using Particle Swarm Optimization -- Developing...”View full text
Electronic
eBook
9
Published 2006
Table of Contents:
“... Pheromone Communication Primitive -- Logical Neighborhoods: A Programming Abstraction for Wireless Sensor...”View full text
Electronic
eBook
10
Published 2014
Table of Contents:
“...Processing Collective Knowledge – Conflict Resolution and Integration Aspects -- How to Store...”View full text
Electronic
eBook
11
Published 2010
Table of Contents:
“... Devices -- A Practical Cryptographic Denial of Service Attack against 802.11i TKIP and CCMP -- User...”View full text
Electronic
eBook
12
Published 2010
Table of Contents:
“... Development Put into Practice -- Timely Time Estimates -- Compiler-Support for Robust Multi-core Computing...”View full text
Electronic
eBook
13
Published 2008
Table of Contents:
“...-to-End Integrity Protection in Signed PGP Mail -- Unclonable Lightweight Authentication Scheme -- Threat...”View full text
Electronic
eBook
14
Published 2010
Table of Contents:
“... of Scenarios across Multiple Abstraction Levels -- Product Families I -- Requirements Value Chains: Stakeholder...”View full text
Electronic
eBook
15
Published 2008
Table of Contents:
“... Identification -- Strategic Abilities of Agents -- Regular Papers -- Aggregation of Attack Relations: A Social...”View full text
Electronic
eBook
16
Published 2005
Table of Contents:
“... -- Integrated Computation, Communication and Control: Towards Next Revolution in Information Technology...”View full text
Electronic
eBook
17
18
Published 2014
Table of Contents:
“... Solution as Normal Distribution -- Text Categorization with Diversity Random Forests -- Unknown Attack...”View full text
Electronic
eBook
19
Published 2012
Table of Contents:
“... Description -- Computer Aided Writing – A Framework Supporting Research Tasks, Topic Recommendations and Text...”View full text
Electronic
eBook
20
Published 2012
Table of Contents:
“... Cipher -- PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications: Extended Abstract...”View full text
Electronic
eBook



