1
Published 2008
Table of Contents: ... and Big Commuting Diagrams (Abstract) -- 2. ASM Papers -- Model Based Refinement and the Tools of Tomorrow...
View full text
Electronic eBook
2
Published 2015
Table of Contents: ... with Structural Plasticity: Attacking the Subset Sum Problem -- P Systems with Generalized Multisets over Totally...
View full text
Electronic eBook
3
Published 2010
Table of Contents: ... Selection Based on Soft Computing Techniques -- Obtaining the Compatibility between Musicians Using Soft...
View full text
Electronic eBook
4
Published 2007
Table of Contents: ... -- A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols -- An Abstraction...
View full text
Electronic eBook
5
Published 2012
Table of Contents: ... attacks -- ving the Usability of Specification Languages and Methods for Annotation-based Verification...
View full text
Electronic eBook
6
Published 2014
Table of Contents: ... Theories via Implicit Predicate Abstraction -- SMT-Based Verification of Software Countermeasures against...
View full text
Electronic eBook
7
Published 2010
Table of Contents: ... Classification Rules with Gene Expression Programming: A Preliminary Study -- Solving Classification Problems...
View full text
Electronic eBook
8
Published 2010
Table of Contents: ... of Genetic Programming Evolved Classifier Expressions Using Particle Swarm Optimization -- Developing...
View full text
Electronic eBook
9
Published 2006
Table of Contents: ... Pheromone Communication Primitive -- Logical Neighborhoods: A Programming Abstraction for Wireless Sensor...
View full text
Electronic eBook
10
Published 2014
Table of Contents: ...Processing Collective Knowledge – Conflict Resolution and Integration Aspects -- How to Store...
View full text
Electronic eBook
11
Published 2010
Table of Contents: ... Devices -- A Practical Cryptographic Denial of Service Attack against 802.11i TKIP and CCMP -- User...
View full text
Electronic eBook
12
Published 2010
Table of Contents: ... Development Put into Practice -- Timely Time Estimates -- Compiler-Support for Robust Multi-core Computing...
View full text
Electronic eBook
13
Published 2008
Table of Contents: ...-to-End Integrity Protection in Signed PGP Mail -- Unclonable Lightweight Authentication Scheme -- Threat...
View full text
Electronic eBook
14
Published 2010
Table of Contents: ... of Scenarios across Multiple Abstraction Levels -- Product Families I -- Requirements Value Chains: Stakeholder...
View full text
Electronic eBook
15
Published 2008
Table of Contents: ... Identification -- Strategic Abilities of Agents -- Regular Papers -- Aggregation of Attack Relations: A Social...
View full text
Electronic eBook
16
Published 2005
Table of Contents: ... -- Integrated Computation, Communication and Control: Towards Next Revolution in Information Technology...
View full text
Electronic eBook
17
Subjects: ...Data structures (Computer science)....
View full text
Electronic eBook
18
Published 2014
Table of Contents: ... Solution as Normal Distribution -- Text Categorization with Diversity Random Forests -- Unknown Attack...
View full text
Electronic eBook
19
Published 2012
Table of Contents: ... Description -- Computer Aided Writing – A Framework Supporting Research Tasks, Topic Recommendations and Text...
View full text
Electronic eBook
20
Published 2012
Table of Contents: ... Cipher -- PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications: Extended Abstract...
View full text
Electronic eBook