1
Publicado 2014
Table of Contents: ... Polarization -- Experimental Study and Analysis of Security Threats in Compromised Networks -- A Weighted...
Ligazón do recurso
Electrónico eBook
2
Publicado 2008
Table of Contents: ... Architecture -- Code Arrangement of Embedded Java Virtual Machine for NAND Flash Memory -- Aggressive Function...
Ligazón do recurso
Electrónico eBook
3
Publicado 2015
Table of Contents: ... for a Lazy Functional Language Timed History Preserving Bisimulation and Open Maps -- Process Opacity...
Ligazón do recurso
Electrónico eBook
4
Publicado 2005
Table of Contents: ... in Exploiting Dependent And-Parallelism in Logic Programming: Leftness Detection in Dynamic Search Trees...
Ligazón do recurso
Electrónico eBook
5
Publicado 2007
Table of Contents: ... Complex Event Processing Based on RFID Standards -- Physical/Cyber Objects Management Framework...
Ligazón do recurso
Electrónico eBook
6
Publicado 2005
Table of Contents: ... -- Injecting Communication Faults to Experimentally Validate Java Distributed Applications -- Implementing...
Ligazón do recurso
Electrónico eBook