Search alternatives:
security problems » security proofs
process security » processing security, process maturity, protocols security
problems https » programs https, problems hints, problems help
1
Table of Contents: ...Introduction -- Problem Formulation -- Design of First-Order Circular Differential Arrays -- Design...
View full text
Electronic eBook
2
Published 2007
Table of Contents: ... Causes of Implementation Problems and Proven Ways to Overcome them -- A Security Architecture...
View full text
Electronic eBook
3
Published 2006
Table of Contents: ...-stabilizing Transformer -- Optimal Message-Driven Implementation of Omega with Mute Processes -- Incremental...
View full text
Electronic eBook
4
Published 2010
Table of Contents: ... Linear Array -- Parallel Prefix Computation in the Recursive Dual-Net -- A Two-Phase Differential...
View full text
Electronic eBook
5
Published 2005
Table of Contents: ... Blocks in Disk Arrays -- An NFSv4-Based Security Scheme for NAS -- Using Blocks Correlations to Improve...
View full text
Electronic eBook
6
Published 2008
Table of Contents: ... with Unstable Links -- Sensor Networks Continue to Puzzle: Selected Open Problems -- Distributed Coordination...
View full text
Electronic eBook
7
Published 2015
Table of Contents: ... the Efficiency of Cloud Computing -- Chapter 12. Object Oriented Modeling of IDEA for E-learning Security...
View full text
Electronic eBook
8
Published 2015
Table of Contents: ...BORM-II and UML as accessibility process in knowledge and business modelling -- Planning-Context...
View full text
Electronic eBook
9
Published 2013
Table of Contents: ... the Sorted-Set Intersection Problem onto a Graphics Processing Unit -- A Novel Double Dynamic Stress...
View full text
Electronic eBook
10
Published 2012
Table of Contents: ... Analysis System Based on a DSP -- Improved Neural Networks Based Method for Infrared Focal Plane Arrays...
View full text
Electronic eBook
11
Published 2013
Table of Contents: ... Systems.- A Survey on Event Processing for CPS.- MND: An Information of Detected Neighbors Based Multi...
View full text
Electronic eBook
12
Published 2005
Table of Contents: ... -- Session 2: Peer-to-Peer Computing -- A Secure P2P Video Conference System for Enterprise Environments...
View full text
Electronic eBook
13
Published 2007
Table of Contents: ...-objective Model Checking of Markov Decision Processes -- PReMo: An Analyzer for Probabilistic Recursive...
View full text
Electronic eBook
14
Published 2015
Table of Contents: ... Gate Arrays -- Centralized and Software-Based Run-Time Traffic Management Inside Configurable Regions...
View full text
Electronic eBook
15
Published 2005
Table of Contents: ...On Evaluating the Performance of Security Protocols -- Timed Equivalences for Timed Event...
View full text
Electronic eBook
16
Published 2010
Table of Contents: ... One Area to the Other -- Ensuring Basic Security and Preventing Replay Attack in a Query Processing...
View full text
Electronic eBook
17
Published 2005
Table of Contents: ... Management -- DIET: Building Problem Solving Environments for the Grid -- The Future Evolution of High...
View full text
Electronic eBook
18
Published 2010
Table of Contents: ... Stochastic Programming Problems Using Differential Evolution -- Multi Sensor Fusion Using Fitness Adaptive...
View full text
Electronic eBook
19
Published 2015
Table of Contents: .... Higher Order Hybrid Invexity Frameworks and Discrete Multiobjective Fractional Programming Problems...
View full text
Electronic eBook
20
Published 2015
Table of Contents: ... of Dynamic Process Networks -- MULTIGAIN: A Controller Synthesis Tool for MDPs with Multiple Mean-Payoff...
View full text
Electronic eBook