Search alternatives:
functionality securing » functionality setting, functionality using, functionality testing
program functionality » protein functionality, programs functional, supra functionality
parallel simulation » parallel computation
simulation program » education program
securing https » security https, security http, securing rtp
1
Published 2010
Table of Contents: ...) -- Efficient Grid on the OTIS-Arrangment Network -- Single Thread Program Parallelism with Dataflow Abstracting...
View full text
Electronic eBook
2
Published 2012
Table of Contents: ... of Quality Metrics for Functional Safety in Systems of Cooperative Vehicles -- From Autonomous Vehicles...
View full text
Electronic eBook
3
Published 2005
Table of Contents: ... -- Zero-Knowledge and Secure Computations -- An Unbounded Simulation-Sound Non-interactive Zero-Knowledge...
View full text
Electronic eBook
4
Published 2006
Table of Contents: ...Keynote Speech -- Data Mining for Security Applications -- Web and Text Mining for Terrorism...
View full text
Electronic eBook
5
Published 2014
Table of Contents: ... -- On DNF Approximators for Monotone Boolean Functions -- Internal DLA: Efficient Simulation of a Physical...
View full text
Electronic eBook
6
Published 2006
Table of Contents: ... Spaces with Massively Parallel Embedded Processors -- Efficient Automated Clock Gating Using CoDeL...
View full text
Electronic eBook
7
Published 2007
Table of Contents: ... XScale Power Simulator -- Session 8 - Security and Asynchronous Design -- Low Power Elliptic Curve...
View full text
Electronic eBook
8
Published 2008
Table of Contents: ... -- A Framework for Contract-Policy Matching Based on Symbolic Simulations for Securing Mobile Device...
View full text
Electronic eBook
9
Published 2007
Table of Contents: ...-Biology -- Speedup Analysis for Parallel Implementation of Model of Response Accuracy and Response Time...
View full text
Electronic eBook
10
Published 2007
Table of Contents: ... Execution of Parallel Processes: Penetrating NATs over the Grid -- Parallelization of C# Programs Through...
View full text
Electronic eBook
11
Published 2010
Table of Contents: ... on Real Space and Digital Space Symbiosis -- Workshop on Information Retrieval, Security and Innovative...
View full text
Electronic eBook
12
Published 2007
Table of Contents: ...Finite Abstract Models for Deterministic Transition Systems: Fair Parallel Composition...
View full text
Electronic eBook
13
Published 2007
Table of Contents: ... -- Visualization of Five Erosion Risk Classes using Kernel Discriminants -- Computer Security and Safety...
View full text
Electronic eBook
14
Published 2013
Table of Contents: ... on Different Penalty Functions with DIRECT Algorithm.- Multilocal Programming: A Derivative-Free Filter...
View full text
Electronic eBook
15
Published 2006
Table of Contents: ... Simulate Something As Complex As the Immune System? -- A Parallel Immune Algorithm for Global Optimization...
View full text
Electronic eBook
16
Published 2010
Table of Contents: ... Oscillation of Motion Predicting Function -- Security of Virtualized Applications: Microsoft App-V and VMware...
View full text
Electronic eBook
17
Table of Contents: ... Protocol Security. Summary -- Bioinformatics Applications. Introduction. Applications. Dynamic Programming...
View full text
Electronic eBook
18
Published 2010
Table of Contents: ...Bridging Calculus and Statistics: Null - Hypotheses Underlain by Functional Equations...
View full text
Electronic eBook
19
Published 2008
Table of Contents: ... -- Accomplishments and Challenges in Code Development for Parallel and Multimechanics Simulations -- An Algorithm...
View full text
Electronic eBook
20
Published 2007
Table of Contents: ... Decentralized Parallel I/O Scheduling Strategies for Parallel File Systems -- Distributed Security Constrained...
View full text
Electronic eBook