Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
program verification » formal verification
functionality adding » functionality using, functionality amino, functionality setting
https functionality » its functionality, bags functionality, cross functionality
verification https » modification https, verification heap, verification attack
adding https » aging https, auditing https, banking https
program verification » formal verification
functionality adding » functionality using, functionality amino, functionality setting
https functionality » its functionality, bags functionality, cross functionality
verification https » modification https, verification heap, verification attack
adding https » aging https, auditing https, banking https
1
Published 2008
Table of Contents:
“... Automaton Model Checking -- Program Verification by Reduction to Semi-algebraic Systems Solving -- Debugging...”View full text
Electronic
eBook
2
Published 2008
Table of Contents:
“... Constraint-Programming Framework for Bounded Program Verification -- Exploiting Common Subexpressions...”View full text
Electronic
eBook
3
Published 2006
Table of Contents:
“...Using CHRs to Generate Functional Test Cases for the Java Card Virtual Machine -- Generic Cut...”View full text
Electronic
eBook
4
Published 2010
Table of Contents:
“...Session 1. Invited Papers -- A Process-Theoretic Look at Automata -- Verification, Performance...”View full text
Electronic
eBook
5
Published 2005
Table of Contents:
“... in GAs and EDAs -- Spatial Approach to Pose Variations in Face Verification -- Analysis of Feature...”View full text
Electronic
eBook
6
Published 2008
Table of Contents:
“... -- Graph Grammar Modeling and Verification of Ad Hoc Routing Protocols -- Proving Ptolemy Right...”View full text
Electronic
eBook
7
Published 2006
Table of Contents:
“...Keynote Talk I -- Distributed Security Algorithms by Mobile Agents -- Session I A: Ad Hoc Networks...”View full text
Electronic
eBook
8
Published 2010
Table of Contents:
“... of Genetic Programming Evolved Classifier Expressions Using Particle Swarm Optimization -- Developing...”View full text
Electronic
eBook
9
Published 2005
Table of Contents:
“... Functions -- Fast Generic Model-Checking for Data-Based Systems -- Logic and Model Checking for Hidden...”View full text
Electronic
eBook
10
Published 2014
Table of Contents:
“...Laws of Programming: The Algebraic Unification of Theories of Concurrency -- The Benefits...”View full text
Electronic
eBook
11
Published 2008
Table of Contents:
“... Will Rule -- Rule Engineering -- Development and Verification of Rule Based Systems — A Survey of Developers...”View full text
Electronic
eBook
12
Published 2014
Table of Contents:
“... of Energy Aware Routing Protocols and Mechanisms for Mobile Ad hoc Networks -- Lexical Ontology Based...”View full text
Electronic
eBook
13
Published 2010
Table of Contents:
“... Cat Map -- Hybrid Activities of AODV for Wireless Ad hoc Sensor Network -- Design and Evaluation of a...”View full text
Electronic
eBook
14
Published 2010
Table of Contents:
“...Green Computing and Health Care Informatics -- Lot-Size Planning with Non-linear Cost Functions...”View full text
Electronic
eBook
15
Published 2007
Table of Contents:
“... Normalization Tool Using Mathematica -- Symbolic Manipulation of Bspline Basis Functions with Mathematica...”View full text
Electronic
eBook
16
Published 2006
Table of Contents:
“... Preference Specifications for Application Sessions -- Mobile Ad Hoc Services: Semantic Service Discovery...”View full text
Electronic
eBook
17
Published 2005
Table of Contents:
“... -- Adding Fault-Tolerance Using Pre-synthesized Components -- Efficiency of Dynamic Arbitration in TDMA...”View full text
Electronic
eBook
18
Published 2015
Table of Contents:
“... Backpressure Scheduling for Delay-Aware Routing in Ad Hoc Networks -- Cache Control Issues in Pub-Sub Networks...”View full text
Electronic
eBook
19
Published 2005
Table of Contents:
“... Signature Verification -- A Secure On-Demand Routing with Distributed Authentication for Trust-Based Ad Hoc...”View full text
Electronic
eBook
20
Published 2005
Table of Contents:
“... View Optimization for Viewing Objects in Motion -- Adding Hand Motion to the Motion Capture Based...”View full text
Electronic
eBook



