Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
programmed security » programming security, program security, programmable security
method processing » metal processing, method process, methods preprocessing
interface method » interface methods, interphase method, interval method
https » http
programmed security » programming security, program security, programmable security
method processing » metal processing, method process, methods preprocessing
interface method » interface methods, interphase method, interval method
https » http
1
Published 2007
Table of Contents:
“... -- Secure and Fast Roaming in 802.11 WLANS -- Wormhole Detection Method based on Location in Wireless Ad-Hoc...”View full text
Electronic
eBook
2
Published 2005
Table of Contents:
“... Development Methods: The Case of the Prisoner Dilemma and Extreme Programming -- A Framework for Understanding...”View full text
Electronic
eBook
3
Published 2010
Table of Contents:
“... Generic Binary Analysis Method for Malware -- A-HIP: A Solution Offering Secure and Anonymous...”View full text
Electronic
eBook
4
Published 2010
Table of Contents:
“... in Pair Programming -- Continuous Selective Testing -- Applying SCRUM in an OSS Development Process...”View full text
Electronic
eBook
5
Published 2006
Table of Contents:
“... Key Generation for Multi-layer Ad-Hoc Networks -- Enabling Secure Discovery in a Pervasive Environment...”View full text
Electronic
eBook
6
Published 2007
Table of Contents:
“... -- Developing Character Input Methods for Driver Information Systems -- Linguistic Analysis of Websites: A New...”View full text
Electronic
eBook
7
Published 2005
Table of Contents:
“... Engineering of Emergency and Process Shutdown Systems -- Combining Extended UML Models and Formal Methods...”View full text
Electronic
eBook
8
Published 2005
Table of Contents:
“... for Process Mediation -- How Symbolic Animation Can Help Designing an Efficient Formal Model -- Security -- A...”View full text
Electronic
eBook
9
Published 2006
Table of Contents:
“... and Verification -- A Method for Formalizing, Analyzing, and Verifying Secure User Interfaces -- Applying Timed...”View full text
Electronic
eBook
10
Published 2014
Table of Contents:
“... Modelling Process to Run-time Management of Many-Core Systems -- Verifying Behavioral UML Systems via CEGAR...”View full text
Electronic
eBook
11
Published 2006
Table of Contents:
“... -- On Mobility of Software Processes -- Software Process Fusion: Uniting Pair Programming and Solo Programming...”View full text
Electronic
eBook
12
Published 2014
Table of Contents:
“... -- Discrete Hardware Apparatus and Method for Mobile Application and Communication Security -- Authentication...”View full text
Electronic
eBook
13
Published 2005
Table of Contents:
“... for Security and Trust -- A Formal Security Analysis of an OSA/Parlay Authentication Interface -- Composition...”View full text
Electronic
eBook
14
Published 2006
Table of Contents:
“...Invited Speakers -- Security Issues in Service Composition -- Separating Distribution from...”View full text
Electronic
eBook
15
Published 2012
Table of Contents:
“....- Inferring Semantic Interfaces of Data Structures.- Learning-Based Test Programming for Programmers...”View full text
Electronic
eBook
16
Published 2010
Table of Contents:
“... -- Formal Languages and Methods for Designing and Verifying Complex Embedded Systems -- Thematic Track...”View full text
Electronic
eBook
17
Published 2010
Table of Contents:
“... Constrained SIFT Matching -- A Method for Music Structure Analysis Using MPEG-4 TwinVQ Audio Compression -- A...”View full text
Electronic
eBook
18
Published 2008
Table of Contents:
“... Processes in Computer Program Comprehension -- Eye Monitoring Studies on TV News and the Web Converge: A...”View full text
Electronic
eBook
19
Published 2007
Table of Contents:
“... -- Processes and Methods -- A Component-Based Process for Developing Automotive ECU Software -- A Systematic...”View full text
Electronic
eBook
20
Published 2010
Table of Contents:
“... Methods and Tools - Modeling, Evaluation and Compilation -- Models and Algorithms for Hyperreconfigurable...”View full text
Electronic
eBook



