1
Publicat 2007
Taula de continguts: ... -- Secure and Fast Roaming in 802.11 WLANS -- Wormhole Detection Method based on Location in Wireless Ad-Hoc...
Obtenir text complet
Electrònic eBook
2
Publicat 2005
Taula de continguts: ... Development Methods: The Case of the Prisoner Dilemma and Extreme Programming -- A Framework for Understanding...
Obtenir text complet
Electrònic eBook
3
Publicat 2010
Taula de continguts: ... Generic Binary Analysis Method for Malware -- A-HIP: A Solution Offering Secure and Anonymous...
Obtenir text complet
Electrònic eBook
4
Publicat 2010
Taula de continguts: ... in Pair Programming -- Continuous Selective Testing -- Applying SCRUM in an OSS Development Process...
Obtenir text complet
Electrònic eBook
5
Publicat 2006
Taula de continguts: ... Key Generation for Multi-layer Ad-Hoc Networks -- Enabling Secure Discovery in a Pervasive Environment...
Obtenir text complet
Electrònic eBook
6
Publicat 2007
Taula de continguts: ... -- Developing Character Input Methods for Driver Information Systems -- Linguistic Analysis of Websites: A New...
Obtenir text complet
Electrònic eBook
7
Publicat 2005
Taula de continguts: ... Engineering of Emergency and Process Shutdown Systems -- Combining Extended UML Models and Formal Methods...
Obtenir text complet
Electrònic eBook
8
Publicat 2005
Taula de continguts: ... for Process Mediation -- How Symbolic Animation Can Help Designing an Efficient Formal Model -- Security -- A...
Obtenir text complet
Electrònic eBook
9
Publicat 2006
Taula de continguts: ... and Verification -- A Method for Formalizing, Analyzing, and Verifying Secure User Interfaces -- Applying Timed...
Obtenir text complet
Electrònic eBook
10
Publicat 2014
Taula de continguts: ... Modelling Process to Run-time Management of Many-Core Systems -- Verifying Behavioral UML Systems via CEGAR...
Obtenir text complet
Electrònic eBook
11
Publicat 2006
Taula de continguts: ... -- On Mobility of Software Processes -- Software Process Fusion: Uniting Pair Programming and Solo Programming...
Obtenir text complet
Electrònic eBook
12
Publicat 2014
Taula de continguts: ... -- Discrete Hardware Apparatus and Method for Mobile Application and Communication Security -- Authentication...
Obtenir text complet
Electrònic eBook
13
Publicat 2005
Taula de continguts: ... for Security and Trust -- A Formal Security Analysis of an OSA/Parlay Authentication Interface -- Composition...
Obtenir text complet
Electrònic eBook
14
Publicat 2006
Taula de continguts: ...Invited Speakers -- Security Issues in Service Composition -- Separating Distribution from...
Obtenir text complet
Electrònic eBook
15
Publicat 2012
Taula de continguts: ....- Inferring Semantic Interfaces of Data Structures.- Learning-Based Test Programming for Programmers...
Obtenir text complet
Electrònic eBook
16
Publicat 2010
Taula de continguts: ... -- Formal Languages and Methods for Designing and Verifying Complex Embedded Systems -- Thematic Track...
Obtenir text complet
Electrònic eBook
17
Publicat 2010
Taula de continguts: ... Constrained SIFT Matching -- A Method for Music Structure Analysis Using MPEG-4 TwinVQ Audio Compression -- A...
Obtenir text complet
Electrònic eBook
18
Publicat 2008
Taula de continguts: ... Processes in Computer Program Comprehension -- Eye Monitoring Studies on TV News and the Web Converge: A...
Obtenir text complet
Electrònic eBook
19
Publicat 2007
Taula de continguts: ... -- Processes and Methods -- A Component-Based Process for Developing Automotive ECU Software -- A Systematic...
Obtenir text complet
Electrònic eBook
20
Publicat 2010
Taula de continguts: ... Methods and Tools - Modeling, Evaluation and Compilation -- Models and Algorithms for Hyperreconfigurable...
Obtenir text complet
Electrònic eBook