Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
programming programming » programming programmed, programming program
programming constructs » programming concepts, programming contest
security programming » secure programming, recursive programming, security program
integrated security » integrating security, internet security, integrated series
constructs https » construction https, constructs loops, constructs arti
programming programming » programming programmed, programming program
programming constructs » programming concepts, programming contest
security programming » secure programming, recursive programming, security program
integrated security » integrating security, internet security, integrated series
constructs https » construction https, constructs loops, constructs arti
1
Programming Languages and Systems 17th European Symposium on Programming, ESOP 2008, Held as Part...
Published 2008
Table of Contents:
“... Specialisation of Horn Clauses -- ESOP Invited Talk -- Constructive Mathematics and Functional Programming...”View full text
Electronic
eBook
2
Published 2013
Table of Contents:
“... -- Analysis of Boolean Programs -- Weighted Pushdown Systems with Indexed Weight Domains -- Underapproximation...”View full text
Electronic
eBook
3
Logic for Programming, Artificial Intelligence, and Reasoning 13th International Conference, LPAR...
Published 2006
Table of Contents:
“... -- Constructing Camin-Sokal Phylogenies Via Answer Set Programming -- Automata for Positive Core XPath Queries...”View full text
Electronic
eBook
4
Published 2007
Table of Contents:
“... -- Exploring Different Constraint-Based Modelings for Program Verification -- An Application of Constraint...”View full text
Electronic
eBook
5
Published 2014
Table of Contents:
“... for Flat Array Properties -- SATMC: A SAT-Based Model Checker for Security-Critical Systems -- IC3 Modulo...”View full text
Electronic
eBook
6
Published 2008
Table of Contents:
“... Cases -- Constructing a Safety Case for Automatically Generated Code from Formal Program Verification...”View full text
Electronic
eBook
7
Published 2013
Table of Contents:
“...Control-Flow Integrity in Web Applications Using Security Policies to Automate Placement of Network...”View full text
Electronic
eBook
8
Published 2006
Table of Contents:
“... and Applications Security -- A Practical Alternative to Domain and Type Enforcement Integrity Formal Models...”View full text
Electronic
eBook
9
Published 2007
Table of Contents:
“... -- Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction -- Secret Signatures: How...”View full text
Electronic
eBook
10
Published 2014
Table of Contents:
“...Human Security Engineering -- Human Security Engineering as a Practical Approach -- Construction...”View full text
Electronic
eBook
11
Published 2010
Table of Contents:
“... Program Implementation: An Application to Anonymous Broadcast -- Network Security – II -- Surveying DNS...”View full text
Electronic
eBook
12
Published 2010
Table of Contents:
“... -- An Automatic Approach to Aid Process Integration within a Secure Software Processes Family -- Engineering...”View full text
Electronic
eBook
13
Published 2007
Table of Contents:
“...Data Integration and Query Reformulation in Service-Based Grids -- Towards a Common Deployment...”View full text
Electronic
eBook
14
Published 2010
Table of Contents:
“... Structure in Networked Ontologies -- Web Services -- On the Secure Sharing and Aggregation of Data...”View full text
Electronic
eBook
15
Published 2005
Table of Contents:
“...-RT Active Classes via Mapping into Circus -- Security -- Towards an Integrated Formal Analysis...”View full text
Electronic
eBook
16
Published 2013
Table of Contents:
“... Verification with Data -- Programming Without Borders -- Regular Papers -- Informative Types and Effects...”View full text
Electronic
eBook
17
Published 2008
Table of Contents:
“... Scheduling of Arbitrary-Deadline Sporadic Task Systems -- Scalable and Distributed Mechanisms for Integrated...”View full text
Electronic
eBook
18
Published 2008
Table of Contents:
“...-Service Construction -- Applications of Formal Approaches to Service-Oriented Computing -- A Use-Case...”View full text
Electronic
eBook
19
Published 2008
Table of Contents:
“... for Software and Data Integration -- Model Construction with External Constraints: An Interactive Journey from...”View full text
Electronic
eBook
20
Published 2010
Table of Contents:
“... -- Cloud and Distributed System Security -- A Distributed and Privacy-Preserving Method for Network...”View full text
Electronic
eBook



