Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
programming complexity » programming complete, programming comparing, programming component
function attacking » functions attacking, function tracking, function making
attacking https » teaching https
https function » its function, sites function, ups function
programming complexity » programming complete, programming comparing, programming component
function attacking » functions attacking, function tracking, function making
attacking https » teaching https
https function » its function, sites function, ups function
1
Publicado 2006
Table of Contents:
“... Criteria in a Genetic Programming System for System Identification -- Invariance of Function Complexity...”Ligazón do recurso
Electrónico
eBook
2
Publicado 2013
Table of Contents:
“... Vital Signals Complexity by Matrix Analysis -- Analyzing the Chaotic Behaviour of the Harmonic Function...”Ligazón do recurso
Electrónico
eBook
3
Programming Languages and Systems 24th European Symposium on Programming, ESOP 2015, Held as Part...
Publicado 2015
Table of Contents:
“... Programs in Dynamic Languages -- Fine-Grained Detection of Privilege Escalation Attacks on Browser...”Ligazón do recurso
Electrónico
eBook
4
Publicado 2008
Table of Contents:
“... of Programming -- The Tractability Frontier for NFA Minimization -- Finite Automata, Digraph Connectivity...”Ligazón do recurso
Electrónico
eBook
5
Programming Languages and Systems 14th European Symposium on Programming, ESOP 2005, Held as Part...
Publicado 2005
Table of Contents:
“...Programming with Explicit Security Policies -- Trace Partitioning in Abstract Interpretation Based...”Ligazón do recurso
Electrónico
eBook
6
Publicado 2005
Table of Contents:
“...-Performance Computing in Turbulence Research: Separated Flow Past an Airfoil at High Angle of Attack -- DNS...”Ligazón do recurso
Electrónico
eBook
7
Publicado 2008
Table of Contents:
“... Verification of ToolBus Scripts -- A Formal Analysis of Complex Type Flaw Attacks on Security Protocols...”Ligazón do recurso
Electrónico
eBook
8
Publicado 2012
Table of Contents:
“... attacks -- ving the Usability of Specification Languages and Methods for Annotation-based Verification...”Ligazón do recurso
Electrónico
eBook
9
Publicado 2008
Table of Contents:
“... Vulnerability to Doubling Attacks -- Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3...”Ligazón do recurso
Electrónico
eBook
10
Publicado 2006
Table of Contents:
“...) Probability Function for FMS IP Trace-Back Technique -- A Mechanism for Detection and Prevention...”Ligazón do recurso
Electrónico
eBook
11
Publicado 2010
Table of Contents:
“... of Genetic Programming Evolved Classifier Expressions Using Particle Swarm Optimization -- Developing...”Ligazón do recurso
Electrónico
eBook
12
Publicado 2010
Table of Contents:
“... Using All-Or-Nothing Transform Encryption -- Prevention of Wormhole Attacks in Mobile Ad Hoc Networks...”Ligazón do recurso
Electrónico
eBook
13
Publicado 2005
Table of Contents:
“... Equilibria of Linear Congestion Games,, -- The Complexity of Games on Highly Regular Graphs -- Computing...”Ligazón do recurso
Electrónico
eBook
14
Publicado 2010
Table of Contents:
“... in Distributed Environments by Simultaneous Fragmentation and Allocation -- Parallel Architectures -- Function...”Ligazón do recurso
Electrónico
eBook
15
Publicado 2005
Table of Contents:
“... Papers -- Complexity of Minimal Tree Routing and Coloring -- Energy Efficient Broadcasting...”Ligazón do recurso
Electrónico
eBook
16
Publicado 2010
Table of Contents:
“... Classification Rules with Gene Expression Programming: A Preliminary Study -- Solving Classification Problems...”Ligazón do recurso
Electrónico
eBook
17
Publicado 2010
Table of Contents:
“... on Outranking for Database Preference Queries -- Incremental Membership Function Updates -- A New Approach...”Ligazón do recurso
Electrónico
eBook
18
Publicado 2008
Table of Contents:
“... Structure Theory -- Exploiting Ontological Structure for Complex Preference Assembly -- Constraints -- A...”Ligazón do recurso
Electrónico
eBook
19
Publicado 2008
Table of Contents:
“... -- Analyzing Stripped Device-Driver Executables -- Model Checking-Based Genetic Programming with an Application...”Ligazón do recurso
Electrónico
eBook
20
Publicado 2008
Table of Contents:
“... Permutation -- Hash Function Cryptanalysis (I) -- Second Preimage Attack on 3-Pass HAVAL and Partial Key...”Ligazón do recurso
Electrónico
eBook



