Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
exploiting programming » exploring programming, evaluating programming, existing programming
program implementation » project implementation
interfaces exploiting » interface exploring, intersafe exploiting, interfaces explorations
implementation https » instrumentation https, implementation _
programming program » programming programmed, programming problem, programming problems
exploiting programming » exploring programming, evaluating programming, existing programming
program implementation » project implementation
interfaces exploiting » interface exploring, intersafe exploiting, interfaces explorations
implementation https » instrumentation https, implementation _
programming program » programming programmed, programming problem, programming problems
1
Published 2005
Table of Contents:
“...Exploiting Single-Assignment Properties to Optimize Message-Passing Programs by Code...”View full text
Electronic
eBook
2
Published 2006
Table of Contents:
“... Implementation -- Scalable Parallel Suffix Array Construction -- Formal Verification of Programs That Use MPI One...”View full text
Electronic
eBook
3
Published 2007
Table of Contents:
“... Multiclusters -- Using CMT in SCTP-Based MPI to Exploit Multiple Interfaces in Cluster Nodes -- MPI-I/O...”View full text
Electronic
eBook
4
Subjects:
“...Software Engineering/Programming and Operating Systems. https://scigraph.springernature.com...”
View full text
View full text
Electronic
eBook
5
Published 2010
Table of Contents:
“... Evaluation of Image Watermarking Algorithms -- Implementation of Efficient seamless non-broadcast Routing...”View full text
Electronic
eBook
6
Published 2008
Table of Contents:
“... Implementation Modeling Based Product Derivation in Software Product Line -- Feature-Oriented Analysis...”View full text
Electronic
eBook
7
Published 2015
Table of Contents:
“...Concurrent Systems: Hybrid Object Implementations and Abortable Objects -- Runtime-Aware...”View full text
Electronic
eBook
8
Published 2008
Table of Contents:
“... -- Exploiting Web Services and Model-Based User Interfaces for Multi-device Access to Home Applications...”View full text
Electronic
eBook
9
Published 2006
Table of Contents:
“... -- Wrapping PDF Documents Exploiting Uncertain Knowledge -- Supporting Customised Collaboration over Shared...”View full text
Electronic
eBook
10
Published 2014
Table of Contents:
“... Prediction -- Multi-context logics-a general introduction -- Constraint programming for context comprehension...”View full text
Electronic
eBook
11
Table of Contents:
“... with Windows Media Center -- Managing General Windows Vista Security -- Implementing the Windows Firewall...”
View full text
View full text
Electronic
eBook
12
Published 2005
Table of Contents:
“...-optimizing Systems -- Exploiting Hub States in Automatic Verification -- Combined Methods -- An Approach...”View full text
Electronic
eBook
13
Published 2007
Table of Contents:
“... Based on Attention.XML -- Cross-System Validation of Engagement Prediction from Log Files -- Exploiting...”View full text
Electronic
eBook
14
Published 2005
Table of Contents:
“...-models on Test: UML vs. OPM in the SODA Case Study -- Programming an Agent as Abstract State Machine...”View full text
Electronic
eBook
15
Published 2012
Table of Contents:
“...21st Century Learning for 21st Century Skills: What Does It Mean, and How Do We Do It -- Exploiting...”View full text
Electronic
eBook
16
Published 2008
Table of Contents:
“... Learning Environment -- Eeney, Meeney, Miney, Mo? Selecting a First Programming Language -- Exploiting ICT...”View full text
Electronic
eBook
17
Published 2008
Table of Contents:
“... Morphodynamical Prediction System on Cluster Computers -- Implementing a Parallel NetCDF Interface for Seamless...”View full text
Electronic
eBook
18
Published 2007
Table of Contents:
“... Ad-Hoc Networks -- Haggle: Seamless Networking for Mobile Applications -- Exploiting Social...”View full text
Electronic
eBook
19
Published 2008
Table of Contents:
“... Interface for a Language Learning and Instruction Environment -- E-Learning and Deaf Children: A Logic-Based...”View full text
Electronic
eBook
20
Published 2006
Table of Contents:
“... -- Exploiting Passive Advantages of Sentient Artefacts -- Scenario-Based Programming for Ubiquitous Applications...”View full text
Electronic
eBook



