1
Published 2014
Table of Contents: ... Scheme for Mobile Ad-Hoc Network -- Trust Based Network Layer Attacks Prevention in MANET -- Analysis...
View full text
Electronic eBook
2
Published 2008
Table of Contents: ...Malicious Code on Java Card Smartcards: Attacks and Countermeasures -- Static Program Analysis...
View full text
Electronic eBook
3
Published 2014
Table of Contents: ... characteristics of user arrival process to the testing service -- The Role of Enterprise Social Networking (ESN...
View full text
Electronic eBook
4
by Xiong, Jay., Xiong, Jay.
Published 2011
Table of Contents: ...Introduction -- The Process models of the old-established software engineering paradigm...
View full text
Electronic eBook
5
Published 2015
Table of Contents: ... for Static Deadlock Prevention -- Automatically Partitioning Data to Facilitate the Parallelization...
View full text
Electronic eBook
6
Published 2008
Table of Contents: ... Processing -- rMPI: Message Passing on Multicore Processors with On-Chip Interconnect -- Modeling Multigrain...
View full text
Electronic eBook
7
Published 2005
Table of Contents: ... Authorization Scheme for Java -- Specification and Validation of Authorisation Constraints Using UML and OCL...
View full text
Electronic eBook
8
Published 2006
Table of Contents: ... Sensor Networks: Case Analysis of Mica2 -- Energy-Driven Partitioning of Signal Processing Algorithms...
View full text
Electronic eBook
9
Published 2013
Table of Contents: ....- Automatic Performance Model Generation for Java Enterprise Edition (EE) Applications.- Canonical...
View full text
Electronic eBook
10
Published 2010
Table of Contents: ... Applications (RSIA 2010) -- A Cryptographic Algorithm Based on Hybrid Cubes -- Java Implementation for Pairing...
View full text
Electronic eBook
11
Published 2013
Table of Contents: ... Fronts -- Remote Sensing Investigation of Red Mud Catastrophe and Results of Image Processing Assessment...
View full text
Electronic eBook
12
Published 2010
Table of Contents: ... of Runtime Enforcement, with Results -- Enforcing Secure Object Initialization in Java -- Flexible Scheduler...
View full text
Electronic eBook
13
by Bramer, Max., Bramer, Max.
Published 2005
Table of Contents: ... and Output -- Loops -- Preventing Backtracking -- Changing the Prolog Database -- List Processing -- String...
View full text
Electronic eBook
14
Published 2007
Table of Contents: ... Prevention System for Email Applications -- Design and Evaluation of Parallel String Matching Algorithms...
View full text
Electronic eBook
15
Published 2005
Table of Contents: ... Prevention System -- STRIDE: Polymorphic Sled Detection Through Instruction Sequence Analysis -- Piranha...
View full text
Electronic eBook
16
by Bramer, Max., Bramer, Max.
Published 2013
Table of Contents: ... and Arithmetic -- Input and Output -- Loops -- Preventing Backtracking -- Changing the Prolog Database -- List...
View full text
Electronic eBook
17
Published 2007
Table of Contents: ... on the Multistage Markov Process -- Performance Analysis and Evaluation of Digital Connection Oriented Internet...
View full text
Electronic eBook