Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality security » functionality securing, functional security, functionality usability
https functionality » its functionality, bags functionality, cross functionality
program comparing » program comparison, programs compiling, problem comparing
comparing https » computing https, comparing hst, comparing things
functionality security » functionality securing, functional security, functionality usability
https functionality » its functionality, bags functionality, cross functionality
program comparing » program comparison, programs compiling, problem comparing
comparing https » computing https, comparing hst, comparing things
1
Subjects:
“...Security. https://scigraph.springernature.com/ontologies/product-market-codes/I28000...”
View full text
View full text
Electronic
eBook
2
Published 2005
Table of Contents:
“... Testing on Function Block Diagrams -- Comparing Software Measures with Fault Counts Derived from Unit...”View full text
Electronic
eBook
3
Subjects:
“...Programming Techniques. https://scigraph.springernature.com/ontologies/product-market-codes/I14010...”
View full text
View full text
Electronic
eBook
4
Published 2012
Table of Contents:
“... Program Analysis -- Taint Analysis of Security Code in the KLEE Symbolic Execution Engine -- A Generic...”View full text
Electronic
eBook
5
Programming Languages and Systems 16th European Symposium on Programming, ESOP 2007, Held as Part...
Published 2007
Table of Contents:
“... Calculus for a Comparative Analysis of Bio-inspired Calculi -- Applicative Programming -- A Rewriting...”View full text
Electronic
eBook
6
Published 2010
Table of Contents:
“... Cryptanalysis and Stream Cipher -- Algebraic Cryptanalysis of SMS4: Gröbner Basis Attack and SAT Attack Compared...”View full text
Electronic
eBook
7
Logic for Programming, Artificial Intelligence, and Reasoning 13th International Conference, LPAR...
Published 2006
Table of Contents:
“... Order Functional Programs -- Combining Typing and Size Constraints for Checking the Termination...”View full text
Electronic
eBook
8
Published 2007
Table of Contents:
“... Strategies -- A Program Transformation for Tracing Functional Logic Computations -- Termination and Analysis...”View full text
Electronic
eBook
9
Published 2014
Table of Contents:
“... molecular diagnostics in breeding programs -- Introgression libraries with wild relatives of crops -- High...”View full text
Electronic
eBook
10
Published 2012
Table of Contents:
“...Virtualization -- Trusted VM Snapshots in Untrusted Cloud Infrastructures -- Secure and Robust...”View full text
Electronic
eBook
11
Published 2015
Table of Contents:
“... Mechanized Theory of regular trees in dependent type theory -- Deriving Comparators and Show-Functions...”View full text
Electronic
eBook
12
Published 2006
Table of Contents:
“...-Oriented Programming -- Comparing White-Box, Black-Box, and Glass-Box Composition of Aspect Mechanisms...”View full text
Electronic
eBook
13
Published 2014
Table of Contents:
“... Systems -- DynaMate: Dynamically Inferring Loop Invariants for Automatic Full Functional Verification...”View full text
Electronic
eBook
14
Published 2010
Table of Contents:
“... Oscillation of Motion Predicting Function -- Security of Virtualized Applications: Microsoft App-V and VMware...”View full text
Electronic
eBook
15
Published 2010
Table of Contents:
“... the Security in the GSM Radio Network Using Attack Jungles -- Formal Modeling and Verification of Sensor...”View full text
Electronic
eBook
16
Published 2007
Table of Contents:
“... Quality -- Comparing Goal Modelling Languages: An Experiment -- Automatically Generating Requirements from...”View full text
Electronic
eBook
17
Published 2010
Table of Contents:
“... Models of Epistasis -- Partial Orderings for Ranking Help Functions -- Robust Prediction with ANNBFIS...”View full text
Electronic
eBook
18
Subjects:
“...Statistics and Computing/Statistics Programs. https://scigraph.springernature.com/ontologies...”
View full text
View full text
Electronic
eBook
19
Published 2010
Table of Contents:
“... Algorithm into Microcontroller -- Comparative Study of Distance Functions for Nearest Neighbors...”View full text
Electronic
eBook
20
Published 2008
Table of Contents:
“... Remote I/O Using Multi-dimensional Data -- Vectorized AES Core for High-throughput Secure Environments...”View full text
Electronic
eBook



