Tópicos Sugeridos dentro de su búsqueda.
Tópicos Sugeridos dentro de su búsqueda.
Buscar alternativas:
programming optimization » foraging optimization, programming application, programming applications
functionality security » functionality securing, functional security, functionality usability
https functionality » its functionality, bags functionality, cross functionality
optimization https » organization https
programming optimization » foraging optimization, programming application, programming applications
functionality security » functionality securing, functional security, functionality usability
https functionality » its functionality, bags functionality, cross functionality
optimization https » organization https
1
Publicado 2007
Tabla de Contenidos:
“... Computing -- Traitor Tracing with Optimal Transmission Rate -- Symmetric-Key Cryptography -- The Security...”Enlace del recurso
Electrónico
eBook
2
Publicado 2010
Tabla de Contenidos:
“... Stochastic Combinatorial Optimization -- How to Schedule When You Have to Buy Your Energy -- Improving...”Enlace del recurso
Electrónico
eBook
3
Publicado 2006
Tabla de Contenidos:
“... Constrained Optimization -- P-Factor-Approach to Degenerate Optimization Problems -- Non Monotone Algorithms...”Enlace del recurso
Electrónico
eBook
4
Publicado 2012
Tabla de Contenidos:
“... Program Analysis -- Taint Analysis of Security Code in the KLEE Symbolic Execution Engine -- A Generic...”Enlace del recurso
Electrónico
eBook
5
Publicado 2005
Tabla de Contenidos:
“... -- Nondeterminism Analysis of Functional Logic Programs -- Techniques for Scaling Up Analyses Based on Pre...”Enlace del recurso
Electrónico
eBook
6
Publicado 2008
Tabla de Contenidos:
“... Programming -- Computable Functions in ASP: Theory and Implementation -- Composing Normal Programs...”Enlace del recurso
Electrónico
eBook
7
Publicado 2006
Tabla de Contenidos:
“... for Incremental Evaluation of Tabled Logic Programs -- Functional and Constraint Logic Programming -- Memory Reuse...”Enlace del recurso
Electrónico
eBook
8
Publicado 2006
Tabla de Contenidos:
“... -- Oblivious Scalar-Product Protocols -- On Optimizing the k-Ward Micro-aggregation Technique for Secure...”Enlace del recurso
Electrónico
eBook
9
Materias:
“...Security. https://scigraph.springernature.com/ontologies/product-market-codes/I28000...”
Enlace del recurso
Enlace del recurso
Electrónico
eBook
10
Publicado 2006
Tabla de Contenidos:
“... -- Cryptographic Applications -- Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? -- A Handy...”Enlace del recurso
Electrónico
eBook
11
Publicado 2005
Tabla de Contenidos:
“... Generalization and Its Implications on Intrusion Detection -- Intrusion-Resilient Secure Channels -- Optimal...”Enlace del recurso
Electrónico
eBook
12
Publicado 2015
Tabla de Contenidos:
“... Optimally -- Adaptively Secure Coin-Flipping, Revisited -- Optimal Competitiveness for the Rectilinear...”Enlace del recurso
Electrónico
eBook
13
Publicado 2014
Tabla de Contenidos:
“... Software with Recursive Functions (Invited Contribution) -- Track A: Algorithms, Complexity, and Games Weak...”Enlace del recurso
Electrónico
eBook
14
Publicado 2010
Tabla de Contenidos:
“... Optimization -- Plane Spanners of Maximum Degree Six -- The Positive Semidefinite Grothendieck Problem...”Enlace del recurso
Electrónico
eBook
15
Publicado 2010
Tabla de Contenidos:
“... Theory of Time-Bounded Verification -- Physical Algorithms -- Session 1-Track B. Automata -- Optimal...”Enlace del recurso
Electrónico
eBook
16
Publicado 2008
Tabla de Contenidos:
“... -- The Complexity of Boolean Formula Minimization -- Optimal Cryptographic Hardness of Learning Monotone Functions...”Enlace del recurso
Electrónico
eBook
17
Publicado 2007
Tabla de Contenidos:
“... Multiparty Communication Complexity -- Session A5 -- An Optimal Decomposition Algorithm for Tree Edit...”Enlace del recurso
Electrónico
eBook
18
Publicado 2006
Tabla de Contenidos:
“...Abstracts of Invited Talks -- Security and Cooperation in Wireless Networks -- Grey-Box...”Enlace del recurso
Electrónico
eBook
19
Publicado 2007
Tabla de Contenidos:
“... Strategies -- A Program Transformation for Tracing Functional Logic Computations -- Termination and Analysis...”Enlace del recurso
Electrónico
eBook
20
Publicado 2008
Tabla de Contenidos:
“... and Solving Approaches -- Employing “Particle Swarm Optimization” and “Fuzzy Ranking Functions” for Direct...”Enlace del recurso
Electrónico
eBook



