1
Published 2005
Table of Contents: ... and FDR to Software Design -- Concurrent Programming -- Communicating Mobile Processes -- Model-Based...
View full text
Electronic eBook
2
Table of Contents: ... Matching. Evolutionary Image Processing. Summary -- Network Security. Cryptographic Applications. Network...
View full text
Electronic eBook
3
Published 2010
Table of Contents: ... Linear Array -- Parallel Prefix Computation in the Recursive Dual-Net -- A Two-Phase Differential...
View full text
Electronic eBook
4
Published 2010
Table of Contents: ... Contract-Based Reasoning for Verification and Certification of Information Flow Properties of Programs...
View full text
Electronic eBook
5
Published 2014
Table of Contents: ...Composable Transactional Objects: A Position Paper -- Application-Scale Secure Multiparty...
View full text
Electronic eBook
6
Published 2006
Table of Contents: ...-stabilizing Transformer -- Optimal Message-Driven Implementation of Omega with Mute Processes -- Incremental...
View full text
Electronic eBook
7
Published 2012
Table of Contents: ... Processing -- Learn to Swing Up and Balance a Real Pole Based on Raw Visual Input Data -- GPU-Based...
View full text
Electronic eBook
8
Published 2014
Table of Contents: ...Signal and Image Processing -- Real Time Crowd Counting with Human Detection and Human Tracking...
View full text
Electronic eBook
9
Published 2010
Table of Contents: ... for Cryptography and Security Applications -- High-Energy Physics -- Medical Image Processing -- Signal Processing...
View full text
Electronic eBook
10
Published 2008
Table of Contents: ... on Cell Broadband Engine -- Parallel Algorithm for Conflict Graph on OTIS-Triangular Array -- A Deadlock...
View full text
Electronic eBook
11
Published 2015
Table of Contents: ... of Two Wide-band Sources with Four-element Planar Cross Array Based on Three Algorithms -- Fast...
View full text
Electronic eBook
12
Published 2015
Table of Contents: ...BORM-II and UML as accessibility process in knowledge and business modelling -- Planning-Context...
View full text
Electronic eBook
13
Published 2013
Table of Contents: ... of Security Encryption Storage System Based on SAN Environments -- Applying General Probabilistic Neural...
View full text
Electronic eBook
14
Published 2014
Table of Contents: ... for Business Processes -- CBMC-GC: An ANSI C Compiler for Secure Two-Party Computations....
View full text
Electronic eBook
15
Published 2005
Table of Contents: ... Relations -- Languages and Process Calculi for Network Aware Programming – Short Summary - -- Stochastic...
View full text
Electronic eBook
16
Published 2013
Table of Contents: ... for Verification of Data-Centric Processes -- Bounded Proofs and Step Frames -- Compression of Propositional...
View full text
Electronic eBook
17
Published 2005
Table of Contents: ...On Evaluating the Performance of Security Protocols -- Timed Equivalences for Timed Event...
View full text
Electronic eBook
18
Published 2015
Table of Contents: ... for Verifying C Programs -- SMACK+Corral: A Modular Verifier -- Ultimate Automizer with Array Interpolation...
View full text
Electronic eBook
19
Published 2014
Table of Contents: ... for Flat Array Properties -- SATMC: A SAT-Based Model Checker for Security-Critical Systems -- IC3 Modulo...
View full text
Electronic eBook
20
Table of Contents: ..., and Attribute-Based Programming -- Processes, AppDomains, Contexts, and CLR Hosts -- Building Multithreaded...
View full text
Electronic eBook