Search alternatives:
programme foundations » program foundations, programming foundations, program foundation
https functionality » its functionality, bags functionality, cross functionality
functionality based » functional based, functionality needs, functionality business
foundations https » equations https
based https » based http
1
by Edgar, Gerald., Edgar, Gerald.
Published 2008
Subjects: ...Real Functions. https://scigraph.springernature.com/ontologies/product-market-codes/M12171...
View full text
Electronic eBook
2
Published 2006
Table of Contents: ...-Tolerant Parallel Applications with Dynamic Parallel Schedules: A Programmer’s Perspective -- Autonomic...
View full text
Electronic eBook
3
by Vagadia, Bharat., Vagadia, Bharat.
Published 2012
Table of Contents: ... -- Implementing Successful Strategic Outsourcing Programmes....
View full text
Electronic eBook
4
Published 2014
Table of Contents: ...-Dependent-Plasticity with Memristors -- Memristor Bridge-based Artificial Neural Weighting Circuit...
View full text
Electronic eBook
5
Published 2006
Table of Contents: ...Types for Hierarchic Shapes -- Linear Regions Are All You Need -- Type-Based Amortised Heap-Space...
View full text
Electronic eBook
6
Published 2012
Table of Contents: ... Formal Semantics for Weighted Ontology -- Personalised Graph-Based Selection of Web APIs -- Instance...
View full text
Electronic eBook
7
Published 2012
Table of Contents: ... Formal Semantics for Weighted Ontology -- Personalised Graph-Based Selection of Web APIs -- Instance...
View full text
Electronic eBook
8
Published 2005
Table of Contents: ...-Speed TCP -- Advanced Software On-Demand Based on Functional Streaming -- Can Out-of-Order Instruction...
View full text
Electronic eBook
9
Published 2015
Table of Contents: ... of Functional Programs -- Lingva: Generating and Proving Program Properties Using Symbol -- Neutralizing...
View full text
Electronic eBook
10
Published 2010
Table of Contents: ... -- Collision Attacks against the Knudsen-Preneel Compression Functions -- Symmetric-Key Cryptosystems...
View full text
Electronic eBook
11
Published 2008
Table of Contents: ... -- Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms -- Cryptanalysis of the GOST Hash...
View full text
Electronic eBook
12
Published 2007
Table of Contents: ...On a Logical Foundation for Explicit Substitutions -- From Proof-Nets to Linear Logic Type Systems...
View full text
Electronic eBook
13
Published 2014
Table of Contents: ...System Security -- Privacy-Friendly Access Control Based on Personal Attributes -- Are You...
View full text
Electronic eBook
14
Published 2007
Table of Contents: ...Ad-Hoc Networks -- Adaptive Admission Control for Mobile Ad Hoc Networks based on a Cross-layer...
View full text
Electronic eBook
15
by Zheng, Yuliang., Zheng, Yuliang.
Published 2013
Subjects: ...Microwaves, RF and Optical Engineering. https://scigraph.springernature.com/ontologies/product...
View full text
Electronic eBook
16
Subjects: ...Database Management. https://scigraph.springernature.com/ontologies/product-market-codes/I18024...
View full text
Electronic eBook
17
Published 2007
Table of Contents: ... Aspects of Network Configurations -- Programmable Network Functionality for Improved QoS of Interactive...
View full text
Electronic eBook
18
Table of Contents: ...: Appendix -- OpenComRTOS-Suite 1.3 Usage Tutorial -- Foundations for TLA+ and Temporal Logic -- Comparison...
View full text
Electronic eBook
19
by Clark, Dan., Clark, Dan.
Published 2013
Subjects: ...Microsoft and .NET. https://scigraph.springernature.com/ontologies/product-market-codes/I29030...
View full text
Electronic eBook