1
Published 2007
Table of Contents: ...-Based Safety Cases for Medical Devices: Opportunities and Challenges -- Impact of Security on Safety...
View full text
Electronic eBook
2
Published 2010
Table of Contents: ... -- Session 2 -- Comparison between IEC 60880 and IEC 61508 for Certification Purposes in the Nuclear Domain...
View full text
Electronic eBook
3
Published 2012
Table of Contents: ... Program Analysis -- Taint Analysis of Security Code in the KLEE Symbolic Execution Engine -- A Generic...
View full text
Electronic eBook
4
Published 2005
Table of Contents: ... -- Nondeterminism Analysis of Functional Logic Programs -- Techniques for Scaling Up Analyses Based on Pre...
View full text
Electronic eBook
5
Published 2006
Table of Contents: ... Order Functional Programs -- Combining Typing and Size Constraints for Checking the Termination...
View full text
Electronic eBook
6
Published 2015
Table of Contents: ... Unclonable Function: Design of a silicon arbiter-PUF on CMOS 65 nm -- Secure Key Generator using a Loop-PUF...
View full text
Electronic eBook
7
Published 2007
Table of Contents: ... Diagnosis Approaches: Analysis and Comparison under a Biomedicine Application -- Predicting Incomplete Data...
View full text
Electronic eBook
8
Published 2010
Table of Contents: ... Oscillation of Motion Predicting Function -- Security of Virtualized Applications: Microsoft App-V and VMware...
View full text
Electronic eBook
9
Published 2010
Table of Contents: ... Framework for Cerebral CT Perfusion Imaging Methods Comparison -- Application of the Laplacian Pyramid...
View full text
Electronic eBook
10
Published 2010
Table of Contents: ... Models of Epistasis -- Partial Orderings for Ranking Help Functions -- Robust Prediction with ANNBFIS...
View full text
Electronic eBook
11
Published 2010
Table of Contents: ... Stochastic Programming Problems Using Differential Evolution -- Multi Sensor Fusion Using Fitness Adaptive...
View full text
Electronic eBook
12
Published 2010
Table of Contents: ...Bridging Calculus and Statistics: Null - Hypotheses Underlain by Functional Equations...
View full text
Electronic eBook
13
Published 2015
Table of Contents: ...Binary Bat Algorithm: On the Efficiency of Mapping Functions When Handling Binary Problems Using...
View full text
Electronic eBook
14
Published 2010
Table of Contents: ... Approach Using Burr’s Distribution Function for High Speed On-Chip RC Interconnects -- Wavelet-Domain L...
View full text
Electronic eBook
15
Published 2005
Table of Contents: ... -- Biological Systems as Reactive Systems -- Mobile Agents Computing: Security Issues and Algorithmic Solutions...
View full text
Electronic eBook
16
Published 2008
Table of Contents: ... and Applications in Policies, Electronic Contracts and Security -- Abductive Workflow Mining Using Binary...
View full text
Electronic eBook
17
Published 2010
Table of Contents: ...Green Computing and Health Care Informatics -- Lot-Size Planning with Non-linear Cost Functions...
View full text
Electronic eBook
18
Published 2014
Table of Contents: ...Image and Template Security for Palmprint -- Extending Network Lifetime by Time Constrained Data...
View full text
Electronic eBook
19
Published 2007
Table of Contents: ... Logical Rule Generations Based on the Genetic Programming and Its Applications to Data Mining...
View full text
Electronic eBook
20
Published 2008
Table of Contents: ... ergonomic analysis -- Measuring patent similarity by comparing inventions functional trees -- Representing...
View full text
Electronic eBook