Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality securing » functionality setting, functionality using, functionality testing
https functionality » its functionality, bags functionality, cross functionality
programs action » programme action, programs fiction, programs active
securing https » security https, security http, securing rtp
action https » fiction https, reactions https, function https
functionality securing » functionality setting, functionality using, functionality testing
https functionality » its functionality, bags functionality, cross functionality
programs action » programme action, programs fiction, programs active
securing https » security https, security http, securing rtp
action https » fiction https, reactions https, function https
1
Published 2012
Table of Contents:
“... Approximation of Continuous Systems with Trapezoid Step Functions -- Signedness-Agnostic Program Analysis...”View full text
Electronic
eBook
2
Published 2006
Table of Contents:
“... for Incremental Evaluation of Tabled Logic Programs -- Functional and Constraint Logic Programming -- Memory Reuse...”View full text
Electronic
eBook
3
Published 2008
Table of Contents:
“... Programming -- Computable Functions in ASP: Theory and Implementation -- Composing Normal Programs...”View full text
Electronic
eBook
4
Subjects:
“...Security. https://scigraph.springernature.com/ontologies/product-market-codes/I28000...”
View full text
View full text
Electronic
eBook
5
Published 2010
Table of Contents:
“... Performance GHASH Function for Long Messages -- Side-Channel Attacks -- Principles on the Security of AES...”View full text
Electronic
eBook
6
Published 2007
Table of Contents:
“... Programs with Function Symbols -- The Complexity of Temporal Logic with Until and Since over Ordinals...”View full text
Electronic
eBook
7
Published 2008
Table of Contents:
“... Functional Programs -- Denotation by Transformation -- Constraint Solving and Analysis -- Generation of Rule...”View full text
Electronic
eBook
8
Published 2012
Table of Contents:
“...ASLan++ — A formal security specification language for distributed Systems -- Orchestration under...”View full text
Electronic
eBook
9
Published 2012
Table of Contents:
“...Virtualization -- Trusted VM Snapshots in Untrusted Cloud Infrastructures -- Secure and Robust...”View full text
Electronic
eBook
10
Published 2007
Table of Contents:
“... -- Is Your Security Protocol on Time ? -- Adapting the UPPAAL Model of a Distributed Lift System -- Zone...”View full text
Electronic
eBook
11
Published 2006
Table of Contents:
“... Components in Mechatronic UML -- Annotating UML Models with Non-functional Properties for Quantitative...”View full text
Electronic
eBook
12
Table of Contents:
“... the default member -- Member properties and dimension security -- Distinct Count -- Parent-Child dimensions...”
View full text
View full text
Electronic
eBook
13
Published 2008
Table of Contents:
“... Global Path Planning in Time Varying Environments Based on a Cost Evaluation Function -- Grammar...”View full text
Electronic
eBook
14
Published 2008
Table of Contents:
“..., and Compliant Action -- Keynote -- Modelling Coordination and Compensation -- Tools and Applications...”View full text
Electronic
eBook
15
Published 2007
Table of Contents:
“... Heuristics -- Using Predicate Abstraction to Generate Heuristic Functions in UPPAAL -- Real-Time Model...”View full text
Electronic
eBook
16
Published 2008
Table of Contents:
“... Verification of C Programs -- Test Construction for Mathematical Functions -- Model-Based Testing Service...”View full text
Electronic
eBook
17
Published 2010
Table of Contents:
“... -- SecureChange: Security Engineering for Lifelong Evolvable Systems -- 3DLife: Bringing the Media Internet...”View full text
Electronic
eBook
18
Published 2007
Table of Contents:
“... in the Plane -- On the Fractional Chromatic Number of Monotone Self-dual Boolean Functions -- On the Complexity...”View full text
Electronic
eBook
19
Published 2014
Table of Contents:
“... Actions -- An AIF-Based Labeled Argumentation Framework -- On the Semantics of Partially Ordered Bases...”View full text
Electronic
eBook
20
Published 2006
Table of Contents:
“... for Provably Secure Computation -- Scoring Matrices That Induce Metrics on Sequences -- Data Structures...”View full text
Electronic
eBook



