Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
processing functionality » processing functional, protein functionality, properties functionality
functionality security » functionality securing, functional security, functionality usability
java processing » data processing, data processings, data processsing
program java » program jarak, program a, program jom
https » http
processing functionality » processing functional, protein functionality, properties functionality
functionality security » functionality securing, functional security, functionality usability
java processing » data processing, data processings, data processsing
program java » program jarak, program a, program jom
https » http
1
Published 2008
Table of Contents:
“... of Credentials -- Software Security -- BinHunt: Automatically Finding Semantic Differences in Binary Programs...”View full text
Electronic
eBook
2
Published 2010
Table of Contents:
“... and Implementations for Coroutines -- Liberal Typing for Functional Logic Programs -- Session 2 -- A Provably Correct...”View full text
Electronic
eBook
3
Programming Languages and Systems 14th European Symposium on Programming, ESOP 2005, Held as Part...
Published 2005
Table of Contents:
“...Programming with Explicit Security Policies -- Trace Partitioning in Abstract Interpretation Based...”View full text
Electronic
eBook
4
5
Programming Languages and Systems 16th European Symposium on Programming, ESOP 2007, Held as Part...
Published 2007
Table of Contents:
“... Based Security -- A Certified Lightweight Non-interference Java Bytecode Verifier -- Controlling...”View full text
Electronic
eBook
6
Programming Languages and Systems 19th European Symposium on Programming, ESOP 2010, Held as Part...
Published 2010
Table of Contents:
“... Computation -- Propositional Interpolation and Abstract Interpretation -- Functional Programming in Sublinear...”View full text
Electronic
eBook
7
Published 2014
Table of Contents:
“... and VLSI Designs -- Information Security Best Practices -- Smart Card Security -- Graphics Processing Units...”View full text
Electronic
eBook
8
Published 2008
Table of Contents:
“... Engineering -- Verification of Java Programs with Generics -- Domain Axioms for a Family of Near-Semirings...”View full text
Electronic
eBook
9
Published 2010
Table of Contents:
“...Session 1. Invited Papers -- A Process-Theoretic Look at Automata -- Verification, Performance...”View full text
Electronic
eBook
10
Published 2008
Table of Contents:
“... Drivers -- Verified Process-Context Switch for C-Programmed Kernels -- Paper from VSTTE 2005 -- Where...”View full text
Electronic
eBook
11
12
Published 2006
Table of Contents:
“... Developing a Dynamic OCL Constraint Enforcement Tool for Java -- OCL and Graph-Transformations – A Symbiotic...”View full text
Electronic
eBook
13
Published 2005
Table of Contents:
“... -- Here’s Your LegoTM Security Kit: How to Give Developers All Protection Mechanisms They Will Ever Need...”View full text
Electronic
eBook
14
Published 2008
Table of Contents:
“...1. ABZ Invited Talks -- Complex Hardware Modules Can Now be Made Free of Functional Errors without...”View full text
Electronic
eBook
15
Published 2014
Table of Contents:
“... -- Programming with Actors in Java 8 -- Contracts in CML -- Distributed Energy Management Case Study: A Formal...”View full text
Electronic
eBook
16
Subjects:
“...Software Engineering/Programming and Operating Systems. https://scigraph.springernature.com...”
View full text
View full text
Electronic
eBook
17
Published 2010
Table of Contents:
“...Bridging Calculus and Statistics: Null - Hypotheses Underlain by Functional Equations...”View full text
Electronic
eBook
18
Published 2007
Table of Contents:
“... -- Personalized E-Learning Process Using Effective Assessment and Feedback -- Optimally Pricing European Options...”View full text
Electronic
eBook
19
Published 2010
Table of Contents:
“... on Real Space and Digital Space Symbiosis -- Workshop on Information Retrieval, Security and Innovative...”View full text
Electronic
eBook
20
Published 2007
Table of Contents:
“... Logical Rule Generations Based on the Genetic Programming and Its Applications to Data Mining...”View full text
Electronic
eBook



