1
Published 2005
Table of Contents: ...Exploiting Single-Assignment Properties to Optimize Message-Passing Programs by Code...
View full text
Electronic eBook
2
Published 2006
Table of Contents: ... Implementation -- Scalable Parallel Suffix Array Construction -- Formal Verification of Programs That Use MPI One...
View full text
Electronic eBook
3
Published 2007
Table of Contents: ... Multiclusters -- Using CMT in SCTP-Based MPI to Exploit Multiple Interfaces in Cluster Nodes -- MPI-I/O...
View full text
Electronic eBook
4
Subjects: ...Software Engineering/Programming and Operating Systems. https://scigraph.springernature.com...
View full text
Electronic eBook
5
Published 2010
Table of Contents: ... Evaluation of Image Watermarking Algorithms -- Implementation of Efficient seamless non-broadcast Routing...
View full text
Electronic eBook
6
Published 2008
Table of Contents: ... Implementation Modeling Based Product Derivation in Software Product Line -- Feature-Oriented Analysis...
View full text
Electronic eBook
7
Published 2015
Table of Contents: ...Concurrent Systems: Hybrid Object Implementations and Abortable Objects -- Runtime-Aware...
View full text
Electronic eBook
8
Published 2008
Table of Contents: ... -- Exploiting Web Services and Model-Based User Interfaces for Multi-device Access to Home Applications...
View full text
Electronic eBook
9
Published 2006
Table of Contents: ... -- Wrapping PDF Documents Exploiting Uncertain Knowledge -- Supporting Customised Collaboration over Shared...
View full text
Electronic eBook
10
Published 2014
Table of Contents: ... Prediction -- Multi-context logics-a general introduction -- Constraint programming for context comprehension...
View full text
Electronic eBook
11
Table of Contents: ... with Windows Media Center -- Managing General Windows Vista Security -- Implementing the Windows Firewall...
View full text
Electronic eBook
12
Published 2005
Table of Contents: ...-optimizing Systems -- Exploiting Hub States in Automatic Verification -- Combined Methods -- An Approach...
View full text
Electronic eBook
13
Published 2007
Table of Contents: ... Based on Attention.XML -- Cross-System Validation of Engagement Prediction from Log Files -- Exploiting...
View full text
Electronic eBook
14
Published 2005
Table of Contents: ...-models on Test: UML vs. OPM in the SODA Case Study -- Programming an Agent as Abstract State Machine...
View full text
Electronic eBook
15
Published 2012
Table of Contents: ...21st Century Learning for 21st Century Skills: What Does It Mean, and How Do We Do It -- Exploiting...
View full text
Electronic eBook
16
Published 2008
Table of Contents: ... Learning Environment -- Eeney, Meeney, Miney, Mo? Selecting a First Programming Language -- Exploiting ICT...
View full text
Electronic eBook
17
Published 2008
Table of Contents: ... Morphodynamical Prediction System on Cluster Computers -- Implementing a Parallel NetCDF Interface for Seamless...
View full text
Electronic eBook
18
Published 2007
Table of Contents: ... Ad-Hoc Networks -- Haggle: Seamless Networking for Mobile Applications -- Exploiting Social...
View full text
Electronic eBook
19
Published 2008
Table of Contents: ... Interface for a Language Learning and Instruction Environment -- E-Learning and Deaf Children: A Logic-Based...
View full text
Electronic eBook
20
Published 2006
Table of Contents: ... -- Exploiting Passive Advantages of Sentient Artefacts -- Scenario-Based Programming for Ubiquitous Applications...
View full text
Electronic eBook