1
Published 2010
Table of Contents: ... -- Transactional Mutex Locks -- Exceptions for Algorithmic Skeletons -- Generators-of-Generators Library...
View full text
Electronic eBook
2
Table of Contents: ... to Java Mapping -- Important Elements of the ORB Runtime -- A First Example -- Generating Remote Objects...
View full text
Electronic eBook
3
Published 2010
Table of Contents: ... of Causality Requirements in Java Memory Model Is Undecidable -- A Team Object for CoArray Fortran...
View full text
Electronic eBook
4
Published 2006
Table of Contents: ... and Transformations in Calculation Form -- Mappings Make Data Processing Go ’Round -- On the Use of Graph...
View full text
Electronic eBook
5
Published 2008
Table of Contents: ...-organized Computability, and Complex Data Mining -- Regular Papers -- Improving Angle Based Mappings...
View full text
Electronic eBook
6
Published 2006
Table of Contents: ...Full Papers -- Efficiently Updating Cost Repository Values for Query Optimization on Web Data...
View full text
Electronic eBook
7
Published 2013
Table of Contents: ... Approach: Hiding Data in a List of Words -- Secure Cryptosystem with Blind Authentication -- An Effective...
View full text
Electronic eBook
8
Published 2005
Table of Contents: ... for Eliciting User’s Preferences in Web Urban Spaces -- Combining Heterogeneous Spatial Data From Distributed...
View full text
Electronic eBook
9
by Mishra, Vivek., Mishra, Vivek.
Published 2014
Subjects: ...Computer Appl. in Administrative Data Processing. https://scigraph.springernature.com/ontologies...
View full text
Electronic eBook
10
Published 2010
Table of Contents: ... Microarray Data for Novel Hypotheses Generation -- Learning from Positive and Unlabeled Documents...
View full text
Electronic eBook
11
Table of Contents: ...Introduction -- Fundamentals of persistence -- Data structures, libraries, and UML -- Advanced...
View full text
Electronic eBook
12
Published 2005
Table of Contents: ... -- Automatic Model Generation in Model Management -- Signal and Image Processing -- Contourlet Based...
View full text
Electronic eBook
13
Published 2007
Table of Contents: ... -- On Device-Based Identity Management in Enterprises -- Analysis-Level Classes from Secure Business Processes...
View full text
Electronic eBook
14
Published 2007
Table of Contents: ...Data Analysis, Modelling, and Learning -- Taking Class Importance into Account -- Tolerance Based...
View full text
Electronic eBook
15
Published 2013
Table of Contents: ... of OmpSs Task Dependencies -- Beyond Do Loops: Data Transfer Generation with Convex Array Regions...
View full text
Electronic eBook
16
Published 2013
Table of Contents: ...Towards a Distributed Modeling Process Based on Composite Models -- Change Propagation due...
View full text
Electronic eBook
17
Published 2006
Table of Contents: ... -- Courseware Recommendation in E-Learning System -- A Model for Personalized Course Material Generation Based...
View full text
Electronic eBook
18
Published 2008
Table of Contents: ... Process Models -- Matching of Process Data and Operational Data for a Deep Business Analysis -- Methods...
View full text
Electronic eBook
19
Published 2005
Table of Contents: ...Regular Papers -- Accountable Anonymous E-Mail -- Protecting Consumer Data in Composite Web...
View full text
Electronic eBook
20
Published 2014
Table of Contents: ... and VLSI Designs -- Information Security Best Practices -- Smart Card Security -- Graphics Processing Units...
View full text
Electronic eBook