Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality securing » functionality setting, functionality using, functionality testing
https functionality » its functionality, bags functionality, cross functionality
program execution » program evaluation, process execution, project execution
execution https » exertion https, execution status, execution actors
securing https » security https, security http, securing rtp
functionality securing » functionality setting, functionality using, functionality testing
https functionality » its functionality, bags functionality, cross functionality
program execution » program evaluation, process execution, project execution
execution https » exertion https, execution status, execution actors
securing https » security https, security http, securing rtp
1
Published 2005
Table of Contents:
“... Testing on Function Block Diagrams -- Comparing Software Measures with Fault Counts Derived from Unit...”View full text
Electronic
eBook
2
Subjects:
“...Programming Techniques. https://scigraph.springernature.com/ontologies/product-market-codes/I14010...”
View full text
View full text
Electronic
eBook
3
Published 2008
Table of Contents:
“... Composition of Melodic and Harmonic Music by Answer Set Programming -- On the Efficient Execution of ProbLog...”View full text
Electronic
eBook
4
Published 2006
Table of Contents:
“... for Incremental Evaluation of Tabled Logic Programs -- Functional and Constraint Logic Programming -- Memory Reuse...”View full text
Electronic
eBook
5
Published 2012
Table of Contents:
“... Program Analysis -- Taint Analysis of Security Code in the KLEE Symbolic Execution Engine -- A Generic...”View full text
Electronic
eBook
6
Subjects:
“...Security. https://scigraph.springernature.com/ontologies/product-market-codes/I28000...”
View full text
View full text
Electronic
eBook
7
Published 2005
Table of Contents:
“...-Order Functional Programs -- Heterogeneous Fixed Points with Application to Points-To Analysis...”View full text
Electronic
eBook
8
Logic for Programming, Artificial Intelligence, and Reasoning 13th International Conference, LPAR...
Published 2006
Table of Contents:
“... Order Functional Programs -- Combining Typing and Size Constraints for Checking the Termination...”View full text
Electronic
eBook
9
Published 2015
Table of Contents:
“... Functions from Relations in Leon -- Program Analysis and Transformation -- Analyzing array manipulating...”View full text
Electronic
eBook
10
Published 2006
Table of Contents:
“...Keynote Talk I -- Distributed Security Algorithms by Mobile Agents -- Session I A: Ad Hoc Networks...”View full text
Electronic
eBook
11
Published 2005
Table of Contents:
“... Iteration Duplication for Reliable Execution -- Memory Usage Verification for OO Programs -- Abstraction...”View full text
Electronic
eBook
12
Published 2012
Table of Contents:
“...ASLan++ — A formal security specification language for distributed Systems -- Orchestration under...”View full text
Electronic
eBook
13
Published 2010
Table of Contents:
“... Systems -- Program Logics for Sequential Higher-Order Control -- Modular Schedulability Analysis...”View full text
Electronic
eBook
14
Published 2008
Table of Contents:
“... Foundation for Security -- Combining Domain-Specific and Foundational Logics to Verify Complete Software...”View full text
Electronic
eBook
15
Published 2012
Table of Contents:
“... Tactics Using OpenTheory -- Functional Programs: Conversions between Deep and Shallow Embeddings....”View full text
Electronic
eBook
16
Table of Contents:
“... Web Applications with mongrel -- Transferring Files Securely with net-sftp -- Executing Commands...”
View full text
View full text
Electronic
eBook
17
Published 2013
Table of Contents:
“... Functional Programs -- Tool Demonstrations Polyglot: Systematic Analysis for Multiple Statechart Formalisms...”View full text
Electronic
eBook
18
Published 2012
Table of Contents:
“... -- Bigraphical Modelling of Architectural Patterns -- Coordinated Execution of Heterogeneous Service-Oriented...”View full text
Electronic
eBook
19
Published 2015
Table of Contents:
“... -- Executable Proofs, Input-Size Hiding Secure Computation and a New Ideal World -- Semantically Secure Order...”View full text
Electronic
eBook
20
Published 2008
Table of Contents:
“...1. ABZ Invited Talks -- Complex Hardware Modules Can Now be Made Free of Functional Errors without...”View full text
Electronic
eBook



