1
Published 2010
Table of Contents: ...: Parallelization and Optimization -- Vectorization for Java -- Just-in-Time Compiler Assisted Object Reclamation...
View full text
Electronic eBook
2
Published 2010
Table of Contents: ...Workshop on Scheduling for Parallel Computing (SPC 2009) -- Fully Polynomial Time Approximation...
View full text
Electronic eBook
3
Published 2005
Table of Contents: ... with Separation Logic -- An Abstract Interpretation Perspective on Linear vs. Branching Time -- The Parallel...
View full text
Electronic eBook
4
Published 2008
Table of Contents: ... Grid Java Code -- Using Cliques Of Nodes To Store Desktop Grid Checkpoints -- EDGeS: The Common...
View full text
Electronic eBook
5
Published 2006
Table of Contents: ... -- The Robustness of Resource Allocations in Parallel and Distributed Computing Systems -- Pervasive Computing...
View full text
Electronic eBook
6
Published 2010
Table of Contents: ...Bridging Calculus and Statistics: Null - Hypotheses Underlain by Functional Equations...
View full text
Electronic eBook
7
Published 2005
Table of Contents: ...) -- Letter Based Text Scoring Method for Language Identification -- Parallel and Distributed Data Processing...
View full text
Electronic eBook
8
Published 2005
Table of Contents: ... to Mobile Computing – Keynote Address -- Extending Wide-Area Replication Support with Mobility and Improved...
View full text
Electronic eBook
9
Published 2007
Table of Contents: ... -- Application of Safety Analyses in Model Driven Development -- Mission Modes for Safety Critical Java -- Safety...
View full text
Electronic eBook
10
Published 2013
Table of Contents: ... Framework for Modeling Automatic Offloading of Mobile Applications Using Genetic Programming -- Solving...
View full text
Electronic eBook
11
Published 2013
Table of Contents: ... Components to Improve Harmony Search -- A Massive Parallel Cellular GPU Implementation of Neural Network...
View full text
Electronic eBook
12
Published 2014
Table of Contents: ... -- Exploring Chaotic Neural Network for Cryptographic Hash Function -- Protocol to Authenticate the Objects...
View full text
Electronic eBook