Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
computing functionals » combining functional, coupling functional, computing fundamentals
functionals function » function function, functions functional, function dysfunction
trust computing » trusted computing, cluster computing
parallel trust » parallel text, parallel tree, parallel task
function https » functions https, fiction https
computing functionals » combining functional, coupling functional, computing fundamentals
functionals function » function function, functions functional, function dysfunction
trust computing » trusted computing, cluster computing
parallel trust » parallel text, parallel tree, parallel task
function https » functions https, fiction https
1
Published 2006
Table of Contents:
“... About Recursive Functions: A Practical Tool for the Coq Proof Assistant -- Soutei, a Logic-Based Trust...”View full text
Electronic
eBook
2
Published 2010
Table of Contents:
“... -- A Novel Trust Evaluation Model for Mobile P2P Networks -- Session 4: Parallelization...”View full text
Electronic
eBook
3
Published 2007
Table of Contents:
“...-Oriented Heuristic Scheduling Algorithm for Grid Computing -- 3-Points Relationship Based Parallel...”View full text
Electronic
eBook
4
Published 2005
Table of Contents:
“... Grid Service Chain Model -- A Performance-Based Parallel Loop Self-scheduling on Grid Computing...”View full text
Electronic
eBook
5
Published 2007
Table of Contents:
“... Trust the Transgenic Mouse? Insights from Computer Simulations -- Relating Discontinuous Cardiac...”View full text
Electronic
eBook
6
Published 2005
Table of Contents:
“... Computing Environment -- GOP: A Graph-Oriented Programming Model for Parallel and Distributed Systems...”View full text
Electronic
eBook
7
Published 2008
Table of Contents:
“... -- Analysis on Malicious Peer’s Behavior of the P2P Trust Resource Chain Model -- Information Technology...”View full text
Electronic
eBook
8
Published 2010
Table of Contents:
“... Discriminant Analysis and RBF Neural Network -- Parallel Enumeration Sort on OTIS-Hypercube -- A Robust Trust...”View full text
Electronic
eBook
9
Published 2014
Table of Contents:
“...-domain Access Control Based on Trust in Cloud Computing Environment -- Detecting Unhealthy Cloud System...”View full text
Electronic
eBook
10
Published 2007
Table of Contents:
“... Residue Binding Propensity and Sequence Entropy -- Use of Parallel Simulated Annealing for Computational...”View full text
Electronic
eBook
11
Published 2014
Table of Contents:
“... Computational Model to Find Semantic Similarity -- Energy Efficient Cluster Based Aggregation Protocol (EECAP...”View full text
Electronic
eBook
12
Published 2014
Table of Contents:
“... -- Exploring Chaotic Neural Network for Cryptographic Hash Function -- Protocol to Authenticate the Objects...”View full text
Electronic
eBook
13
Published 2010
Table of Contents:
“...Trusted and Pervasive Computing -- Foot Shape Analysis of Adult Male in the China -- Intelligent...”View full text
Electronic
eBook
14
Published 2007
Table of Contents:
“... Models -- Discovering Non-linear Ranking Functions by Solving Semi-algebraic Systems -- Mobile Ambients...”View full text
Electronic
eBook
15
Published 2008
Table of Contents:
“... Media -- The Excitement in Parallel Computing -- Session I: Performance Optimization -- Improving...”View full text
Electronic
eBook
16
Published 2008
Table of Contents:
“... of the Tiling Problem -- Remote Entrusting by Run-Time Software Authentication -- Trusted Computing — Special...”View full text
Electronic
eBook
17
Published 2013
Table of Contents:
“... -- Trusted Computing Architecture for Wi-Fi Protected Access 2 (WPA2) Optimization -- Parallel Pseudo...”View full text
Electronic
eBook
18
Published 2008
Table of Contents:
“... and Solving Approaches -- Employing “Particle Swarm Optimization” and “Fuzzy Ranking Functions” for Direct...”View full text
Electronic
eBook
19
Published 2014
Table of Contents:
“... Strategy -- A Fuzzy Bayesian Approach to Enhance SCADA Network Security -- Trusted Network Access...”View full text
Electronic
eBook
20
Published 2005
Table of Contents:
“... -- Regular Languages, Unambiguous Concatenation and Computational Complexity -- Contributed Papers...”View full text
Electronic
eBook



