1
by Brooks, David R., Brooks, David R.
Published 2007
Table of Contents: ... of the JavaScript Language -- Using Arrays in HTML/JavaScript -- JavaScript Functions....
View full text
Electronic eBook
2
Published 2008
Table of Contents: ... Networks -- Revocation Schemes for Delegation Licences -- Reusability of Functionality-Based Application...
View full text
Electronic eBook
3
Published 2007
Table of Contents: .../Systems -- Visualization of Permission Checks in Java Using Static Analysis -- Deployment of Virtual...
View full text
Electronic eBook
4
by Brooks, David R., Brooks, David R.
Published 2011
Table of Contents: ... -- Fundamentals of the JavaScript Language -- Using Arrays in HTML/JavaScript -- JavaScript Functions -- Creating...
View full text
Electronic eBook
5
Published 2010
Table of Contents: ... in the Future of Intelligent Information Processing -- Knowledge Mining Biological Network Models...
View full text
Electronic eBook
6
Published 2007
Table of Contents: ... Templates for Information Systems: Foundations and Perspectives -- Reduction Based Symbolic Value Partition...
View full text
Electronic eBook
7
by Brooks, David R., Brooks, David R.
Published 2008
Subjects: ...Programming Languages, Compilers, Interpreters. https://scigraph.springernature.com/ontologies...
View full text
Electronic eBook
8
Published 2010
Table of Contents: ... -- Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines -- A Probabilistic Diffusion...
View full text
Electronic eBook
9
Published 2014
Table of Contents: ... Expansion Functions Using Pseudorandom Permutations -- Towards More Practical Time-Driven Cache Attacks...
View full text
Electronic eBook
10
Published 2010
Table of Contents: ...Invited Talks -- Symbolic and Analytic Techniques for Resource Analysis of Java Bytecode...
View full text
Electronic eBook
11
Published 2013
Table of Contents: ... Algorithm for Solving Multi-Objective Optimization Problems -- B-spline Surface Approximation Using...
View full text
Electronic eBook
12
Published 2015
Table of Contents: ... maintenance problem in biomedical Knowledge Organization Systems -- Effective Composition of Mappings...
View full text
Electronic eBook
13
Published 2013
Table of Contents: ... Fault Injection Countermeasure: A New Conception of Java Card Security -- Java Card Combined Attacks...
View full text
Electronic eBook
14
Published 2010
Table of Contents: ... -- Remote Attestation on Function Execution (Work-in-Progress) -- Scalable Remote Attestation with Privacy...
View full text
Electronic eBook
15
Published 2015
Table of Contents: ... -- Progress (and Lack Thereof) for Graph Coloring Approximation Problems -- Recent Results in Scalable Multi...
View full text
Electronic eBook
16
Published 2005
Table of Contents: ... on Java Session-Id Generation -- Update on SHA-1 -- A Fast Correlation Attack on the Shrinking Generator...
View full text
Electronic eBook
17
Published 2005
Table of Contents: ... Recovery -- Extending Databases to Precision-Controlled Retrieval of Qualitative Information -- An Approach...
View full text
Electronic eBook
18
Published 2014
Table of Contents: ...Model-Based Testing for Functional and Security Test Generation -- Model-Based Security Engineering...
View full text
Electronic eBook
19
Published 2010
Table of Contents: ... -- Workshop on Human and Information Space Symbiosis (IWHISS 2010) -- Information Privacy in Smart Office...
View full text
Electronic eBook
20
Published 2010
Table of Contents: ... for Solving Multiprocessor Scheduling Problem -- Online Scheduling of Parallel Jobs on Hypercubes: Maximizing...
View full text
Electronic eBook