1
Published 2005
Table of Contents: ... PIPs to BPEL Processes: A Three Level Approach for Business Protocols -- Short Papers -- Using Software...
View full text
Electronic eBook
2
Published 2008
Table of Contents: ... Human Motion Reconstruction Using Video Processing -- New Interfaces -- Personal Recognition Using...
View full text
Electronic eBook
3
Published 2010
Table of Contents: ...Third Workshop on Highly Parallel Processing on a Chip (HPPC 2009) -- HPPC 2009: 3rd Workshop...
View full text
Electronic eBook
4
Published 2014
Subjects: ...User Interfaces and Human Computer Interaction. https://scigraph.springernature.com/ontologies...
View full text
Electronic eBook
5
Published 2013
Table of Contents: .... Gesticulation: A Test Protocol -- Functional Gestures for Human-Environment Interaction -- A Dynamic Fitting...
View full text
Electronic eBook
6
Published 2010
Table of Contents: ...Session 1. Invited Papers -- A Process-Theoretic Look at Automata -- Verification, Performance...
View full text
Electronic eBook
7
Published 2005
Table of Contents: ... Dynamic Joint Protocols Selection Method to Perform Collaborative Tasks -- A Formal Framework...
View full text
Electronic eBook
8
Published 2005
Table of Contents: ... Integration -- On Operations to Conform Object-Oriented Schemas -- ERP Implementation, Cross-Functionality...
View full text
Electronic eBook
9
Published 2010
Table of Contents: ...-Dimensional Flows in a High Pressure Turbine -- Application of Parallel Processing to the Simulation of Heart...
View full text
Electronic eBook
10
by Smith, Joshua B., Smith, Joshua B.
Published 2007
Table of Contents: ... -- The Objective Part of Caml -- Digression: OCaml Is Not Pure -- Digression: Functional Programming -- Practical...
View full text
Electronic eBook
11
Published 2014
Table of Contents: ... Wavelet with PCA -- Forensic Investigation Processes for Cyber-Crime and Cyber-Space -- Feasibility Study...
View full text
Electronic eBook
12
Published 2006
Table of Contents: ... Authentication Protocol for 3G Mobile Systems Using CSP and Rank Functions -- Attribute-Based Authentication...
View full text
Electronic eBook
13
Published 2005
Table of Contents: ... Verification with Quasar -- Proving Functional Equivalence for Program Slicing in SPARKTM -- Ada and Education...
View full text
Electronic eBook
14
Published 2012
Table of Contents: ... -- Interpolating between Random Walks and Shortest Paths: A Path Functional Approach -- Dynamic Targeting...
View full text
Electronic eBook
15
Published 2010
Table of Contents: ...-Based Authentication and Key Distribution Protocols with Perfect Forward Secrecy -- Using Genetic...
View full text
Electronic eBook
16
Published 2010
Table of Contents: ... Manifesto -- Investigation and Implementation of T-DMB Protocol in NCTUns Simulator -- Empirical Analysis...
View full text
Electronic eBook
17
Published 2010
Table of Contents: ... Network Encryption Protocol in the OTS/CafeOBJ Method -- Model-Driven Design-Space Exploration...
View full text
Electronic eBook
18
Published 2007
Table of Contents: ... Process -- Rotation Invariant Texture Classification Using Gabor Wavelets -- Harmful Contents...
View full text
Electronic eBook
19
Published 2008
Table of Contents: ... Programming Systems in a Higher-Order Framework -- High-Level Expectations for Low-Level Image Processing...
View full text
Electronic eBook
20
Published 2010
Table of Contents: ... Modeling on the Architectural Design Process -- An OpenGL-based Interface to 3D PowerPoint-like...
View full text
Electronic eBook