Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
programs functionality » program functionality, programs functional, properties functionality
functionality securing » functionality setting, functionality using, functionality testing
processing tutorial » processing tutorials, processes tutorial, processing materials
tutorial programs » tutorial program, social programs, cultural programs
securing https » security https, security http, securing rtp
programs functionality » program functionality, programs functional, properties functionality
functionality securing » functionality setting, functionality using, functionality testing
processing tutorial » processing tutorials, processes tutorial, processing materials
tutorial programs » tutorial program, social programs, cultural programs
securing https » security https, security http, securing rtp
1
Published 2010
Table of Contents:
“... and Implementations for Coroutines -- Liberal Typing for Functional Logic Programs -- Session 2 -- A Provably Correct...”View full text
Electronic
eBook
2
Published 2006
Table of Contents:
“... for Incremental Evaluation of Tabled Logic Programs -- Functional and Constraint Logic Programming -- Memory Reuse...”View full text
Electronic
eBook
3
Programming Languages and Systems 14th European Symposium on Programming, ESOP 2005, Held as Part...
Published 2005
Table of Contents:
“...Programming with Explicit Security Policies -- Trace Partitioning in Abstract Interpretation Based...”View full text
Electronic
eBook
4
Published 2010
Table of Contents:
“... Cryptanalysis of SOSEMANUK -- Security Management and Efficient Implementation -- Serial Model for Attack Tree...”View full text
Electronic
eBook
5
Published 2007
Table of Contents:
“... from the Baltic Perspective -- Experiences in Applying Agile Software Development in F-Secure -- People...”View full text
Electronic
eBook
6
Advances in Multimedia Information Processing - PCM 2005 6th Pacific Rim Conference on Multimedia...
Published 2005
Table of Contents:
“... Renegotiating Mechanism for Guaranteed End-to-End QoS over DiffServ Networks -- Secure and Efficient ID-Based...”View full text
Electronic
eBook
7
Published 2006
Table of Contents:
“... Components Selection -- A State-of-the-Practice Survey of Off-the-Shelf Component-Based Development Processes...”View full text
Electronic
eBook
8
Published 2005
Table of Contents:
“... Relations -- Languages and Process Calculi for Network Aware Programming – Short Summary - -- Stochastic...”View full text
Electronic
eBook
9
Published 2008
Table of Contents:
“... Quantification for Concurrent Shape Analysis -- Session 11: Tools – Security and Program Analysis -- The Scyther...”View full text
Electronic
eBook
10
Published 2014
Table of Contents:
“... -- Programming with Actors in Java 8 -- Contracts in CML -- Distributed Energy Management Case Study: A Formal...”View full text
Electronic
eBook
11
Published 2005
Table of Contents:
“... -- Decision on Replacing Components of Security Functions in COTS-Based Information Systems -- Best Papers...”View full text
Electronic
eBook
12
Published 2013
Table of Contents:
“... and Responsibilities -- Service and Information Security Improvement by Collaborative Business Process Management...”View full text
Electronic
eBook
13
Published 2005
Table of Contents:
“... Relation, Definability, and Approximations -- Discernibility Functions and Minimal Rules in Non...”View full text
Electronic
eBook



