1
Published 2013
Table of Contents: ... and Communications Security (NCS 2012) -- A Strong Pvss Scheme -- Secure Cosine Similarity Computation with Malicious...
View full text
Electronic eBook
2
Published 2010
Table of Contents: ... Without Prior Fault Data -- Models of Computation for Heterogeneous Embedded Systems -- A Quotient-Graph...
View full text
Electronic eBook
3
Published 2007
Table of Contents: ... -- Controlling Process Modularity in Mobile Computing -- Failures: Their Definition, Modelling and Analysis -- C...
View full text
Electronic eBook
4
Published 2010
Table of Contents: ... for Interference on Links in Inter-working Multi-hop Wireless Networks -- An Optimum ICA Based Multiuser Data...
View full text
Electronic eBook
5
Published 2010
Table of Contents: ... Choreographies -- Resolving Business Process Interference via Dynamic Reconfiguration -- Linked Data and Service...
View full text
Electronic eBook
6
Published 2007
Table of Contents: ... Negatives -- Behavioural Specifications from Class Models -- Inheriting Laws for Processes with States...
View full text
Electronic eBook
7
Published 2014
Table of Contents: ... for Nuclear Systems; J.Shin, et al -- Optical computing for digital signal process in incoherent fiber system...
View full text
Electronic eBook
8
Published 2007
Table of Contents: ... -- Personalized E-Learning Process Using Effective Assessment and Feedback -- Optimally Pricing European Options...
View full text
Electronic eBook
9
Published 2010
Table of Contents: ... for Wireless Sensor Networks -- FDAN: Failure Detection Protocol for Mobile Ad Hoc Networks -- Interference...
View full text
Electronic eBook