1
Published 2008
Table of Contents: ... of Credentials -- Software Security -- BinHunt: Automatically Finding Semantic Differences in Binary Programs...
View full text
Electronic eBook
2
Published 2010
Table of Contents: ... and Implementations for Coroutines -- Liberal Typing for Functional Logic Programs -- Session 2 -- A Provably Correct...
View full text
Electronic eBook
3
Published 2005
Table of Contents: ...Programming with Explicit Security Policies -- Trace Partitioning in Abstract Interpretation Based...
View full text
Electronic eBook
4
Published 2007
Table of Contents: ... Based Security -- A Certified Lightweight Non-interference Java Bytecode Verifier -- Controlling...
View full text
Electronic eBook
5
Subjects: ...Java (Computer program language)....
View full text
Electronic eBook
6
Published 2010
Table of Contents: ... Computation -- Propositional Interpolation and Abstract Interpretation -- Functional Programming in Sublinear...
View full text
Electronic eBook
7
Published 2014
Table of Contents: ... and VLSI Designs -- Information Security Best Practices -- Smart Card Security -- Graphics Processing Units...
View full text
Electronic eBook
8
Published 2008
Table of Contents: ... Engineering -- Verification of Java Programs with Generics -- Domain Axioms for a Family of Near-Semirings...
View full text
Electronic eBook
9
Published 2010
Table of Contents: ...Session 1. Invited Papers -- A Process-Theoretic Look at Automata -- Verification, Performance...
View full text
Electronic eBook
10
Published 2008
Table of Contents: ... Drivers -- Verified Process-Context Switch for C-Programmed Kernels -- Paper from VSTTE 2005 -- Where...
View full text
Electronic eBook
11
by Townsend, RJ., Townsend, RJ.
Published 2010
Table of Contents: ... to Drupal Functionality....
View full text
Electronic eBook
12
Published 2006
Table of Contents: ... Developing a Dynamic OCL Constraint Enforcement Tool for Java -- OCL and Graph-Transformations – A Symbiotic...
View full text
Electronic eBook
13
Published 2005
Table of Contents: ... -- Here’s Your LegoTM Security Kit: How to Give Developers All Protection Mechanisms They Will Ever Need...
View full text
Electronic eBook
14
Published 2008
Table of Contents: ...1. ABZ Invited Talks -- Complex Hardware Modules Can Now be Made Free of Functional Errors without...
View full text
Electronic eBook
15
Published 2014
Table of Contents: ... -- Programming with Actors in Java 8 -- Contracts in CML -- Distributed Energy Management Case Study: A Formal...
View full text
Electronic eBook
16
Subjects: ...Software Engineering/Programming and Operating Systems. https://scigraph.springernature.com...
View full text
Electronic eBook
17
Published 2010
Table of Contents: ...Bridging Calculus and Statistics: Null - Hypotheses Underlain by Functional Equations...
View full text
Electronic eBook
18
Published 2007
Table of Contents: ... -- Personalized E-Learning Process Using Effective Assessment and Feedback -- Optimally Pricing European Options...
View full text
Electronic eBook
19
Published 2010
Table of Contents: ... on Real Space and Digital Space Symbiosis -- Workshop on Information Retrieval, Security and Innovative...
View full text
Electronic eBook
20
Published 2007
Table of Contents: ... Logical Rule Generations Based on the Genetic Programming and Its Applications to Data Mining...
View full text
Electronic eBook