1
Published 2006
Table of Contents: ... of Sets and Binary Relations in Continuum Theory: A Survey -- Weak Systems of Gandy, Jensen and Devlin...
View full text
Electronic eBook
2
by Coles, Michael., Coles, Michael.
Published 2008
Table of Contents: ...The Role of T-SQL -- Tools of the Trade -- T-SQL for SQL Server 2000 Programmers -- Expand coverage...
View full text
Electronic eBook
3
by Addis, Tom., Addis, Tom., Addis, Jan.
Published 2010
Table of Contents: ...Preface -- Why Schematic Functional Programming -- Making Changes -- In Pursuit of Elegance -- Mind...
View full text
Electronic eBook
4
Published 2010
Table of Contents: ...Invited Talks -- Investigating Universal Computability of Conventional Cellular Automata Problems...
View full text
Electronic eBook
5
Published 2006
Table of Contents: ...: Distributed Computing and Algorithms I -- Programmer-Centric Conditions for Itanium Memory Consistency -- A...
View full text
Electronic eBook
6
Published 2005
Table of Contents: ... Grid -- Session 1: Grid Computing -- CGSV: An Adaptable Stream-Integrated Grid Monitoring System...
View full text
Electronic eBook
7
Published 2015
Table of Contents: ... -- Hierarchical Dynamic Power-Gating in FPGAs -- Tools and Compilers -- Hardware Synthesis from Functional...
View full text
Electronic eBook
8
Table of Contents: ...Algebraic Preliminaries -- Integration of Rational Functions -- Differential Fields -- The Order...
View full text
Electronic eBook
9
Table of Contents: ...Cohomological Theory of Crystals over Function Fields and Applications -- On Geometric Iwasawa...
View full text
Electronic eBook
10
Published 2014
Table of Contents: ... Breakpoints -- Key Management for Onion Routing in a True Peer to Peer Setting (short paper) -- Threshold...
View full text
Electronic eBook
11
by Edgar, Gerald., Edgar, Gerald.
Published 2008
Subjects: ...Real Functions. https://scigraph.springernature.com/ontologies/product-market-codes/M12171...
View full text
Electronic eBook
12
Published 2014
Table of Contents: ... in Programmable Logic Controllers Using Power Fingerprinting -- Timing of Cyber-Physical Attacks on Process...
View full text
Electronic eBook
13
Published 2014
Table of Contents: ...Construction of Explanation Graphs from Extended Dependency Graphs for Answer Set Programs...
View full text
Electronic eBook
14
Published 2012
Table of Contents: ... for Secure Computation.- Black-Box Constructions of Composable Protocols without Set-Up.- Privacy -- Crowd...
View full text
Electronic eBook
15
Published 2013
Table of Contents: ... Configuration Checking in Secure Cooperative Data Access -- 9: Programmable Diagnostic Network Measurement...
View full text
Electronic eBook
16
Published 2006
Table of Contents: ...The Need for Standards -- Programmable Platform Characterization for System Level Performance...
View full text
Electronic eBook
17
Published 2010
Table of Contents: ... Approach Using Burr’s Distribution Function for High Speed On-Chip RC Interconnects -- Wavelet-Domain L...
View full text
Electronic eBook
18
Published 2015
Table of Contents: ... -- On the Security of Distributed Multiprime RSA -- Formal Modeling of Random Oracle Programmability and Verification...
View full text
Electronic eBook
19
Published 2007
Table of Contents: ... -- Setting up an Effective Information Security Awareness Programme -- Saferinternet.pl Project — Educational...
View full text
Electronic eBook
20
Published 2015
Table of Contents: ... of Functional Programs -- Lingva: Generating and Proving Program Properties Using Symbol -- Neutralizing...
View full text
Electronic eBook