1
Udgivet 2006
Indholdsfortegnelse: ... About Recursive Functions: A Practical Tool for the Coq Proof Assistant -- Soutei, a Logic-Based Trust...
Få fuldtekst
Electronisk eBog
2
Udgivet 2010
Indholdsfortegnelse: ... -- A Novel Trust Evaluation Model for Mobile P2P Networks -- Session 4: Parallelization...
Få fuldtekst
Electronisk eBog
3
Udgivet 2007
Indholdsfortegnelse: ...-Oriented Heuristic Scheduling Algorithm for Grid Computing -- 3-Points Relationship Based Parallel...
Få fuldtekst
Electronisk eBog
4
Udgivet 2005
Indholdsfortegnelse: ... Grid Service Chain Model -- A Performance-Based Parallel Loop Self-scheduling on Grid Computing...
Få fuldtekst
Electronisk eBog
5
Udgivet 2007
Indholdsfortegnelse: ... Trust the Transgenic Mouse? Insights from Computer Simulations -- Relating Discontinuous Cardiac...
Få fuldtekst
Electronisk eBog
6
Udgivet 2005
Indholdsfortegnelse: ... Computing Environment -- GOP: A Graph-Oriented Programming Model for Parallel and Distributed Systems...
Få fuldtekst
Electronisk eBog
7
Udgivet 2008
Indholdsfortegnelse: ... -- Analysis on Malicious Peer’s Behavior of the P2P Trust Resource Chain Model -- Information Technology...
Få fuldtekst
Electronisk eBog
8
Udgivet 2010
Indholdsfortegnelse: ... Discriminant Analysis and RBF Neural Network -- Parallel Enumeration Sort on OTIS-Hypercube -- A Robust Trust...
Få fuldtekst
Electronisk eBog
9
Udgivet 2014
Indholdsfortegnelse: ...-domain Access Control Based on Trust in Cloud Computing Environment -- Detecting Unhealthy Cloud System...
Få fuldtekst
Electronisk eBog
10
Udgivet 2007
Indholdsfortegnelse: ... Residue Binding Propensity and Sequence Entropy -- Use of Parallel Simulated Annealing for Computational...
Få fuldtekst
Electronisk eBog
11
Udgivet 2014
Indholdsfortegnelse: ... Computational Model to Find Semantic Similarity -- Energy Efficient Cluster Based Aggregation Protocol (EECAP...
Få fuldtekst
Electronisk eBog
12
Udgivet 2014
Indholdsfortegnelse: ... -- Exploring Chaotic Neural Network for Cryptographic Hash Function -- Protocol to Authenticate the Objects...
Få fuldtekst
Electronisk eBog
13
Udgivet 2010
Indholdsfortegnelse: ...Trusted and Pervasive Computing -- Foot Shape Analysis of Adult Male in the China -- Intelligent...
Få fuldtekst
Electronisk eBog
14
Udgivet 2007
Indholdsfortegnelse: ... Models -- Discovering Non-linear Ranking Functions by Solving Semi-algebraic Systems -- Mobile Ambients...
Få fuldtekst
Electronisk eBog
15
Udgivet 2008
Indholdsfortegnelse: ... Media -- The Excitement in Parallel Computing -- Session I: Performance Optimization -- Improving...
Få fuldtekst
Electronisk eBog
16
Udgivet 2008
Indholdsfortegnelse: ... of the Tiling Problem -- Remote Entrusting by Run-Time Software Authentication -- Trusted Computing — Special...
Få fuldtekst
Electronisk eBog
17
Udgivet 2013
Indholdsfortegnelse: ... -- Trusted Computing Architecture for Wi-Fi Protected Access 2 (WPA2) Optimization -- Parallel Pseudo...
Få fuldtekst
Electronisk eBog
18
Udgivet 2008
Indholdsfortegnelse: ... and Solving Approaches -- Employing “Particle Swarm Optimization” and “Fuzzy Ranking Functions” for Direct...
Få fuldtekst
Electronisk eBog
19
Udgivet 2014
Indholdsfortegnelse: ... Strategy -- A Fuzzy Bayesian Approach to Enhance SCADA Network Security -- Trusted Network Access...
Få fuldtekst
Electronisk eBog
20
Udgivet 2005
Indholdsfortegnelse: ... -- Regular Languages, Unambiguous Concatenation and Computational Complexity -- Contributed Papers...
Få fuldtekst
Electronisk eBog