1
Published 2014
Table of Contents: ... Polarization -- Experimental Study and Analysis of Security Threats in Compromised Networks -- A Weighted...
View full text
Electronic eBook
2
Published 2008
Table of Contents: ... Architecture -- Code Arrangement of Embedded Java Virtual Machine for NAND Flash Memory -- Aggressive Function...
View full text
Electronic eBook
3
Published 2015
Table of Contents: ... for a Lazy Functional Language Timed History Preserving Bisimulation and Open Maps -- Process Opacity...
View full text
Electronic eBook
4
Published 2005
Table of Contents: ... in Exploiting Dependent And-Parallelism in Logic Programming: Leftness Detection in Dynamic Search Trees...
View full text
Electronic eBook
5
Published 2007
Table of Contents: ... Complex Event Processing Based on RFID Standards -- Physical/Cyber Objects Management Framework...
View full text
Electronic eBook
6
Published 2005
Table of Contents: ... -- Injecting Communication Faults to Experimentally Validate Java Distributed Applications -- Implementing...
View full text
Electronic eBook