Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality securing » functionality setting, functionality using, functionality testing
https functionality » its functionality, bags functionality, cross functionality
program comparison » problem comparison, programming comparison, program composition
comparison https » comparison maps, comparison bits, computation https
securing https » security https, security http, securing rtp
functionality securing » functionality setting, functionality using, functionality testing
https functionality » its functionality, bags functionality, cross functionality
program comparison » problem comparison, programming comparison, program composition
comparison https » comparison maps, comparison bits, computation https
securing https » security https, security http, securing rtp
1
Published 2007
Table of Contents:
“...-Based Safety Cases for Medical Devices: Opportunities and Challenges -- Impact of Security on Safety...”View full text
Electronic
eBook
2
Published 2010
Table of Contents:
“... -- Session 2 -- Comparison between IEC 60880 and IEC 61508 for Certification Purposes in the Nuclear Domain...”View full text
Electronic
eBook
3
Published 2012
Table of Contents:
“... Program Analysis -- Taint Analysis of Security Code in the KLEE Symbolic Execution Engine -- A Generic...”View full text
Electronic
eBook
4
Published 2005
Table of Contents:
“... -- Nondeterminism Analysis of Functional Logic Programs -- Techniques for Scaling Up Analyses Based on Pre...”View full text
Electronic
eBook
5
Logic for Programming, Artificial Intelligence, and Reasoning 13th International Conference, LPAR...
Published 2006
Table of Contents:
“... Order Functional Programs -- Combining Typing and Size Constraints for Checking the Termination...”View full text
Electronic
eBook
6
Published 2015
Table of Contents:
“... Unclonable Function: Design of a silicon arbiter-PUF on CMOS 65 nm -- Secure Key Generator using a Loop-PUF...”View full text
Electronic
eBook
7
Published 2007
Table of Contents:
“... Diagnosis Approaches: Analysis and Comparison under a Biomedicine Application -- Predicting Incomplete Data...”View full text
Electronic
eBook
8
Published 2010
Table of Contents:
“... Oscillation of Motion Predicting Function -- Security of Virtualized Applications: Microsoft App-V and VMware...”View full text
Electronic
eBook
9
Published 2010
Table of Contents:
“... Framework for Cerebral CT Perfusion Imaging Methods Comparison -- Application of the Laplacian Pyramid...”View full text
Electronic
eBook
10
Published 2010
Table of Contents:
“... Models of Epistasis -- Partial Orderings for Ranking Help Functions -- Robust Prediction with ANNBFIS...”View full text
Electronic
eBook
11
Published 2010
Table of Contents:
“... Stochastic Programming Problems Using Differential Evolution -- Multi Sensor Fusion Using Fitness Adaptive...”View full text
Electronic
eBook
12
Published 2010
Table of Contents:
“...Bridging Calculus and Statistics: Null - Hypotheses Underlain by Functional Equations...”View full text
Electronic
eBook
13
Published 2015
Table of Contents:
“...Binary Bat Algorithm: On the Efficiency of Mapping Functions When Handling Binary Problems Using...”View full text
Electronic
eBook
14
Published 2010
Table of Contents:
“... Approach Using Burr’s Distribution Function for High Speed On-Chip RC Interconnects -- Wavelet-Domain L...”View full text
Electronic
eBook
15
Published 2005
Table of Contents:
“... -- Biological Systems as Reactive Systems -- Mobile Agents Computing: Security Issues and Algorithmic Solutions...”View full text
Electronic
eBook
16
Published 2008
Table of Contents:
“... and Applications in Policies, Electronic Contracts and Security -- Abductive Workflow Mining Using Binary...”View full text
Electronic
eBook
17
Published 2010
Table of Contents:
“...Green Computing and Health Care Informatics -- Lot-Size Planning with Non-linear Cost Functions...”View full text
Electronic
eBook
18
Published 2014
Table of Contents:
“...Image and Template Security for Palmprint -- Extending Network Lifetime by Time Constrained Data...”View full text
Electronic
eBook
19
Published 2007
Table of Contents:
“... Logical Rule Generations Based on the Genetic Programming and Its Applications to Data Mining...”View full text
Electronic
eBook
20
Published 2008
Table of Contents:
“... ergonomic analysis -- Measuring patent similarity by comparing inventions functional trees -- Representing...”View full text
Electronic
eBook



