Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
process security » processing security, process maturity, protocols security
security program » security problems, security proofs, security proof
program https » programs https, program has, program help
process security » processing security, process maturity, protocols security
security program » security problems, security proofs, security proof
program https » programs https, program has, program help
1
Published 2005
Table of Contents:
“... and FDR to Software Design -- Concurrent Programming -- Communicating Mobile Processes -- Model-Based...”View full text
Electronic
eBook
2
Table of Contents:
“... Matching. Evolutionary Image Processing. Summary -- Network Security. Cryptographic Applications. Network...”
View full text
View full text
Electronic
eBook
3
Published 2010
Table of Contents:
“... Linear Array -- Parallel Prefix Computation in the Recursive Dual-Net -- A Two-Phase Differential...”View full text
Electronic
eBook
4
Programming Languages and Systems 19th European Symposium on Programming, ESOP 2010, Held as Part...
Published 2010
Table of Contents:
“... Contract-Based Reasoning for Verification and Certification of Information Flow Properties of Programs...”View full text
Electronic
eBook
5
Programming Languages and Systems 23rd European Symposium on Programming, ESOP 2014, Held as Part...
Published 2014
Table of Contents:
“...Composable Transactional Objects: A Position Paper -- Application-Scale Secure Multiparty...”View full text
Electronic
eBook
6
Published 2006
Table of Contents:
“...-stabilizing Transformer -- Optimal Message-Driven Implementation of Omega with Mute Processes -- Incremental...”View full text
Electronic
eBook
7
Published 2012
Table of Contents:
“... Processing -- Learn to Swing Up and Balance a Real Pole Based on Raw Visual Input Data -- GPU-Based...”View full text
Electronic
eBook
8
Published 2014
Table of Contents:
“...Signal and Image Processing -- Real Time Crowd Counting with Human Detection and Human Tracking...”View full text
Electronic
eBook
9
Published 2010
Table of Contents:
“... for Cryptography and Security Applications -- High-Energy Physics -- Medical Image Processing -- Signal Processing...”View full text
Electronic
eBook
10
Published 2008
Table of Contents:
“... on Cell Broadband Engine -- Parallel Algorithm for Conflict Graph on OTIS-Triangular Array -- A Deadlock...”View full text
Electronic
eBook
11
Published 2015
Table of Contents:
“... of Two Wide-band Sources with Four-element Planar Cross Array Based on Three Algorithms -- Fast...”View full text
Electronic
eBook
12
Published 2015
Table of Contents:
“...BORM-II and UML as accessibility process in knowledge and business modelling -- Planning-Context...”View full text
Electronic
eBook
13
Published 2013
Table of Contents:
“... of Security Encryption Storage System Based on SAN Environments -- Applying General Probabilistic Neural...”View full text
Electronic
eBook
14
Published 2014
Table of Contents:
“... for Business Processes -- CBMC-GC: An ANSI C Compiler for Secure Two-Party Computations....”View full text
Electronic
eBook
15
Published 2005
Table of Contents:
“... Relations -- Languages and Process Calculi for Network Aware Programming – Short Summary - -- Stochastic...”View full text
Electronic
eBook
16
Published 2013
Table of Contents:
“... for Verification of Data-Centric Processes -- Bounded Proofs and Step Frames -- Compression of Propositional...”View full text
Electronic
eBook
17
Published 2005
Table of Contents:
“...On Evaluating the Performance of Security Protocols -- Timed Equivalences for Timed Event...”View full text
Electronic
eBook
18
Published 2015
Table of Contents:
“... for Verifying C Programs -- SMACK+Corral: A Modular Verifier -- Ultimate Automizer with Array Interpolation...”View full text
Electronic
eBook
19
Published 2014
Table of Contents:
“... for Flat Array Properties -- SATMC: A SAT-Based Model Checker for Security-Critical Systems -- IC3 Modulo...”View full text
Electronic
eBook
20
Table of Contents:
“..., and Attribute-Based Programming -- Processes, AppDomains, Contexts, and CLR Hosts -- Building Multithreaded...”
View full text
View full text
Electronic
eBook



