Önerilen Konular
Önerilen Konular
Şunu mu demek istediniz:
functionality securing » functionality setting, functionality using, functionality testing
program functionality » protein functionality, programs functional, supra functionality
processing tutorial » processing tutorials, processes tutorial, processing materials
tutorial program » tutorial programs
securing https » security https, security http, securing rtp
functionality securing » functionality setting, functionality using, functionality testing
program functionality » protein functionality, programs functional, supra functionality
processing tutorial » processing tutorials, processes tutorial, processing materials
tutorial program » tutorial programs
securing https » security https, security http, securing rtp
1
Baskı/Yayın Bilgisi 2010
İçindekiler:
“... and Implementations for Coroutines -- Liberal Typing for Functional Logic Programs -- Session 2 -- A Provably Correct...”Tam Metin Erişim
Elektronik
Ekitap
2
Baskı/Yayın Bilgisi 2006
İçindekiler:
“... for Incremental Evaluation of Tabled Logic Programs -- Functional and Constraint Logic Programming -- Memory Reuse...”Tam Metin Erişim
Elektronik
Ekitap
3
Programming Languages and Systems 14th European Symposium on Programming, ESOP 2005, Held as Part...
Baskı/Yayın Bilgisi 2005
İçindekiler:
“...Programming with Explicit Security Policies -- Trace Partitioning in Abstract Interpretation Based...”Tam Metin Erişim
Elektronik
Ekitap
4
Baskı/Yayın Bilgisi 2010
İçindekiler:
“... Cryptanalysis of SOSEMANUK -- Security Management and Efficient Implementation -- Serial Model for Attack Tree...”Tam Metin Erişim
Elektronik
Ekitap
5
Baskı/Yayın Bilgisi 2007
İçindekiler:
“... from the Baltic Perspective -- Experiences in Applying Agile Software Development in F-Secure -- People...”Tam Metin Erişim
Elektronik
Ekitap
6
Advances in Multimedia Information Processing - PCM 2005 6th Pacific Rim Conference on Multimedia...
Baskı/Yayın Bilgisi 2005
İçindekiler:
“... Renegotiating Mechanism for Guaranteed End-to-End QoS over DiffServ Networks -- Secure and Efficient ID-Based...”Tam Metin Erişim
Elektronik
Ekitap
7
Baskı/Yayın Bilgisi 2006
İçindekiler:
“... Components Selection -- A State-of-the-Practice Survey of Off-the-Shelf Component-Based Development Processes...”Tam Metin Erişim
Elektronik
Ekitap
8
Baskı/Yayın Bilgisi 2005
İçindekiler:
“... Relations -- Languages and Process Calculi for Network Aware Programming – Short Summary - -- Stochastic...”Tam Metin Erişim
Elektronik
Ekitap
9
Baskı/Yayın Bilgisi 2008
İçindekiler:
“... Quantification for Concurrent Shape Analysis -- Session 11: Tools – Security and Program Analysis -- The Scyther...”Tam Metin Erişim
Elektronik
Ekitap
10
Baskı/Yayın Bilgisi 2014
İçindekiler:
“... -- Programming with Actors in Java 8 -- Contracts in CML -- Distributed Energy Management Case Study: A Formal...”Tam Metin Erişim
Elektronik
Ekitap
11
Baskı/Yayın Bilgisi 2005
İçindekiler:
“... -- Decision on Replacing Components of Security Functions in COTS-Based Information Systems -- Best Papers...”Tam Metin Erişim
Elektronik
Ekitap
12
Baskı/Yayın Bilgisi 2013
İçindekiler:
“... and Responsibilities -- Service and Information Security Improvement by Collaborative Business Process Management...”Tam Metin Erişim
Elektronik
Ekitap
13
Baskı/Yayın Bilgisi 2005
İçindekiler:
“... Relation, Definability, and Approximations -- Discernibility Functions and Minimal Rules in Non...”Tam Metin Erişim
Elektronik
Ekitap



