Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
programming programming » programming programmed, programming program
programming computing » programming comparing, programming composing, programming computer
interference methods » inference methods, intelligence methods, preference methods
methods programming » methods programmed, networks programming, meta programming
https » http
programming programming » programming programmed, programming program
programming computing » programming comparing, programming composing, programming computer
interference methods » inference methods, intelligence methods, preference methods
methods programming » methods programmed, networks programming, meta programming
https » http
1
Published 2007
Table of Contents:
“... -- Unifying Theories of Objects -- Non-interference Properties for Data-Type Reduction of Communicating...”View full text
Electronic
eBook
2
Published 2013
Table of Contents:
“... in Biochemically Reacting Systems -- An Approximate Execution of Rule-Based Multi-level Models -- Computing...”View full text
Electronic
eBook
3
Published 2012
Table of Contents:
“...-threaded Applications.- Bounded-Interference Sequentialization for Testing Concurrent Programs.- Runtime...”View full text
Electronic
eBook
4
Published 2014
Table of Contents:
“... and CPUs -- Multicore Parallelization of the PTAS Dynamic Program for the Bin-Packing Problem -- Energy...”View full text
Electronic
eBook
5
Published 2007
Table of Contents:
“... Orders -- Tree Components Programming: An Application to XML -- A Framework for Incorporating Trust...”View full text
Electronic
eBook
6
Published 2010
Table of Contents:
“... Computing and Multimedia Applications -- An Effective Video Steganography Method for Biometric...”View full text
Electronic
eBook
7
Published 2005
Table of Contents:
“... into Existential Types -- On the Degeneracy of ?-Types in Presence of Computational Classical Logic -- Semantic Cut...”View full text
Electronic
eBook
8
Published 2010
Table of Contents:
“... Without Prior Fault Data -- Models of Computation for Heterogeneous Embedded Systems -- A Quotient-Graph...”View full text
Electronic
eBook
9
Published 2014
Table of Contents:
“... of Timed-Arc Workflow Nets -- Process Model Discovery: A Method Based on Transition System Decomposition...”View full text
Electronic
eBook
10
Published 2006
Table of Contents:
“... -- An Improved Global Trust Value Computing Method in P2P System -- Trusted Priority Control Design...”View full text
Electronic
eBook
11
Published 2010
Table of Contents:
“... Telematics Services -- An Efficient ICI Cancellation Method for Cooperative STBC-OFDM Systems -- Low-Cost Two...”View full text
Electronic
eBook
12
Published 2007
Table of Contents:
“... -- Volume Computation Using a Direct Monte Carlo Method -- Improved Throughput Bounds for Interference-Aware...”View full text
Electronic
eBook
13
Published 2010
Table of Contents:
“... Choreographies -- Resolving Business Process Interference via Dynamic Reconfiguration -- Linked Data and Service...”View full text
Electronic
eBook
14
Published 2012
Table of Contents:
“...Search Computing: Addressing Complex Search on the Web -- Hypergraph-Theoretic Partitioning Models...”View full text
Electronic
eBook
15
Published 2006
Table of Contents:
“... Interference -- Smart Instant Messenger in Pervasive Computing Environments -- Session 2: Grid Scheduling...”View full text
Electronic
eBook
16
Published 2010
Table of Contents:
“... Sampling Component of the Dendritic Cell Algorithm -- FDCM: A Fuzzy Dendritic Cell Method -- Modular RADAR...”View full text
Electronic
eBook
17
Published 2013
Table of Contents:
“... -- An Improved DNA Computing Method for Elevator Scheduling Problem -- Campus Network Operation and Maintenance...”View full text
Electronic
eBook
18
Published 2005
Table of Contents:
“...-Faithful Non-interference Calculus for Java -- A Java Package for Transparent Code Mobility -- Keynote...”View full text
Electronic
eBook
19
Published 2014
Table of Contents:
“...- The Digital Video Frame Obfuscation Method in Consideration of Human Visual System for Intellectual Property...”View full text
Electronic
eBook
20
Published 2013
Table of Contents:
“... Method -- Comparison of SPIHT, Classical and Adaptive Lifting Scheme for Compression of Satellite...”View full text
Electronic
eBook



