1
Published 2010
Table of Contents: ... and Implementations for Coroutines -- Liberal Typing for Functional Logic Programs -- Session 2 -- A Provably Correct...
View full text
Electronic eBook
2
Published 2006
Table of Contents: ... for Incremental Evaluation of Tabled Logic Programs -- Functional and Constraint Logic Programming -- Memory Reuse...
View full text
Electronic eBook
3
Published 2005
Table of Contents: ...Programming with Explicit Security Policies -- Trace Partitioning in Abstract Interpretation Based...
View full text
Electronic eBook
4
Published 2010
Table of Contents: ... Cryptanalysis of SOSEMANUK -- Security Management and Efficient Implementation -- Serial Model for Attack Tree...
View full text
Electronic eBook
5
Published 2007
Table of Contents: ... from the Baltic Perspective -- Experiences in Applying Agile Software Development in F-Secure -- People...
View full text
Electronic eBook
6
Published 2005
Table of Contents: ... Renegotiating Mechanism for Guaranteed End-to-End QoS over DiffServ Networks -- Secure and Efficient ID-Based...
View full text
Electronic eBook
7
Published 2006
Table of Contents: ... Components Selection -- A State-of-the-Practice Survey of Off-the-Shelf Component-Based Development Processes...
View full text
Electronic eBook
8
Published 2005
Table of Contents: ... Relations -- Languages and Process Calculi for Network Aware Programming – Short Summary - -- Stochastic...
View full text
Electronic eBook
9
Published 2008
Table of Contents: ... Quantification for Concurrent Shape Analysis -- Session 11: Tools – Security and Program Analysis -- The Scyther...
View full text
Electronic eBook
10
Published 2014
Table of Contents: ... -- Programming with Actors in Java 8 -- Contracts in CML -- Distributed Energy Management Case Study: A Formal...
View full text
Electronic eBook
11
Published 2005
Table of Contents: ... -- Decision on Replacing Components of Security Functions in COTS-Based Information Systems -- Best Papers...
View full text
Electronic eBook
12
Published 2013
Table of Contents: ... and Responsibilities -- Service and Information Security Improvement by Collaborative Business Process Management...
View full text
Electronic eBook
13
Published 2005
Table of Contents: ... Relation, Definability, and Approximations -- Discernibility Functions and Minimal Rules in Non...
View full text
Electronic eBook