1
Published 2006
Table of Contents: ... About Recursive Functions: A Practical Tool for the Coq Proof Assistant -- Soutei, a Logic-Based Trust...
View full text
Electronic eBook
2
Published 2010
Table of Contents: ... -- A Novel Trust Evaluation Model for Mobile P2P Networks -- Session 4: Parallelization...
View full text
Electronic eBook
3
Published 2007
Table of Contents: ...-Oriented Heuristic Scheduling Algorithm for Grid Computing -- 3-Points Relationship Based Parallel...
View full text
Electronic eBook
4
Published 2005
Table of Contents: ... Grid Service Chain Model -- A Performance-Based Parallel Loop Self-scheduling on Grid Computing...
View full text
Electronic eBook
5
Published 2007
Table of Contents: ... Trust the Transgenic Mouse? Insights from Computer Simulations -- Relating Discontinuous Cardiac...
View full text
Electronic eBook
6
Published 2005
Table of Contents: ... Computing Environment -- GOP: A Graph-Oriented Programming Model for Parallel and Distributed Systems...
View full text
Electronic eBook
7
Published 2008
Table of Contents: ... -- Analysis on Malicious Peer’s Behavior of the P2P Trust Resource Chain Model -- Information Technology...
View full text
Electronic eBook
8
Published 2010
Table of Contents: ... Discriminant Analysis and RBF Neural Network -- Parallel Enumeration Sort on OTIS-Hypercube -- A Robust Trust...
View full text
Electronic eBook
9
Published 2014
Table of Contents: ...-domain Access Control Based on Trust in Cloud Computing Environment -- Detecting Unhealthy Cloud System...
View full text
Electronic eBook
10
Published 2007
Table of Contents: ... Residue Binding Propensity and Sequence Entropy -- Use of Parallel Simulated Annealing for Computational...
View full text
Electronic eBook
11
Published 2014
Table of Contents: ... Computational Model to Find Semantic Similarity -- Energy Efficient Cluster Based Aggregation Protocol (EECAP...
View full text
Electronic eBook
12
Published 2014
Table of Contents: ... -- Exploring Chaotic Neural Network for Cryptographic Hash Function -- Protocol to Authenticate the Objects...
View full text
Electronic eBook
13
Published 2010
Table of Contents: ...Trusted and Pervasive Computing -- Foot Shape Analysis of Adult Male in the China -- Intelligent...
View full text
Electronic eBook
14
Published 2007
Table of Contents: ... Models -- Discovering Non-linear Ranking Functions by Solving Semi-algebraic Systems -- Mobile Ambients...
View full text
Electronic eBook
15
Published 2008
Table of Contents: ... Media -- The Excitement in Parallel Computing -- Session I: Performance Optimization -- Improving...
View full text
Electronic eBook
16
Published 2008
Table of Contents: ... of the Tiling Problem -- Remote Entrusting by Run-Time Software Authentication -- Trusted Computing — Special...
View full text
Electronic eBook
17
Published 2013
Table of Contents: ... -- Trusted Computing Architecture for Wi-Fi Protected Access 2 (WPA2) Optimization -- Parallel Pseudo...
View full text
Electronic eBook
18
Published 2008
Table of Contents: ... and Solving Approaches -- Employing “Particle Swarm Optimization” and “Fuzzy Ranking Functions” for Direct...
View full text
Electronic eBook
19
Published 2014
Table of Contents: ... Strategy -- A Fuzzy Bayesian Approach to Enhance SCADA Network Security -- Trusted Network Access...
View full text
Electronic eBook
20
Published 2005
Table of Contents: ... -- Regular Languages, Unambiguous Concatenation and Computational Complexity -- Contributed Papers...
View full text
Electronic eBook