Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality computing » functionality combining, function computing, functionality using
security functionality » security functional, obesity functionality, security functions
parallel processes » parallel processors, parallel processing
processes security » process security, processes securing, processing security
https » http
functionality computing » functionality combining, function computing, functionality using
security functionality » security functional, obesity functionality, security functions
parallel processes » parallel processors, parallel processing
processes security » process security, processes securing, processing security
https » http
1
Published 2010
Table of Contents:
“...The 2010 International Symposium on Frontiers of Parallel and Distributed Computing (FPDC 2010...”View full text
Electronic
eBook
2
Published 2005
Table of Contents:
“... Grid Service Chain Model -- A Performance-Based Parallel Loop Self-scheduling on Grid Computing...”View full text
Electronic
eBook
3
Published 2010
Table of Contents:
“... Linear Array -- Parallel Prefix Computation in the Recursive Dual-Net -- A Two-Phase Differential...”View full text
Electronic
eBook
4
Published 2015
Table of Contents:
“...Software Engineering: Non-functional Property Aware Brokerage Approach for Cloud Service Discovery...”View full text
Electronic
eBook
5
Published 2012
Table of Contents:
“... of Quality Metrics for Functional Safety in Systems of Cooperative Vehicles -- From Autonomous Vehicles...”View full text
Electronic
eBook
6
Published 2006
Table of Contents:
“... Algorithm for Characteristic Points Evaluation in Static Images of Signatures -- Computer Security Systems...”View full text
Electronic
eBook
7
Table of Contents:
“...-Processing -- Parallelization of PUF Cells -- Pre-Selection -- PUF Biasing -- Two Stage PUF -- PUF...”
View full text
View full text
Electronic
eBook
8
Published 2007
Table of Contents:
“... -- Visualization of Five Erosion Risk Classes using Kernel Discriminants -- Computer Security and Safety...”View full text
Electronic
eBook
9
Published 2013
Table of Contents:
“... Computation and Secret Sharing -- Securely Solving Simple Combinatorial Graph Problems -- Parallel and Dynamic...”View full text
Electronic
eBook
10
Published 2013
Table of Contents:
“... Homomorphic Cryptography (WAHC 13) -- SHADE: Secure Hamming Distance computation from oblivious transfer...”View full text
Electronic
eBook
11
Published 2010
Table of Contents:
“...Theory of Evolutionary Computing (I) -- Optimal Fixed and Adaptive Mutation Rates...”View full text
Electronic
eBook
12
Published 2010
Table of Contents:
“... Multipartite Quantum Systems and Its Role in Quantum Information Processing Tasks -- GPGPU Based Simulations...”View full text
Electronic
eBook
13
Published 2013
Table of Contents:
“... Industrial Robots -- A Combined Position Evaluation Function in Chinese Chess Computer Game -- Modeling...”View full text
Electronic
eBook
14
Published 2014
Table of Contents:
“... Polarization -- Experimental Study and Analysis of Security Threats in Compromised Networks -- A Weighted...”View full text
Electronic
eBook
15
Published 2014
Table of Contents:
“... -- Studies on Quasi-Z-Source-Based Isolated DC/DC Converter for Distributed Power Generation -- Security...”View full text
Electronic
eBook
16
Published 2015
Table of Contents:
“... Multidimensional Feature Vectors -- A Virtualized Architecture for Secure Database Management in Cloud Computing...”View full text
Electronic
eBook
17
Table of Contents:
“... -- Reconfigurable Computing Systems. Parallel Processing on Reconfigurable Computers. A Survey of Reconfigurable...”
View full text
View full text
Electronic
eBook
18
Published 2008
Table of Contents:
“...Query Processing Over The Grid: The Role Of Workflow Management -- From Orc Models To Distributed...”View full text
Electronic
eBook
19
Published 2006
Table of Contents:
“... in Agent-Based Evolutionary Optimization -- An Immunological and an Ethically-social Approach to Security...”View full text
Electronic
eBook
20
Published 2007
Table of Contents:
“... Iterative Computations on Volatile Nodes -- Aspect Oriented Pluggable Support for Parallel Computing...”View full text
Electronic
eBook



