1
Published 2010
Table of Contents: ... Threats to Critical Infrastructures -- Critical Information Infrastructure Protection in the Developing...
View full text
Electronic eBook
2
Published 2008
Table of Contents: ... of Programming -- The Tractability Frontier for NFA Minimization -- Finite Automata, Digraph Connectivity...
View full text
Electronic eBook
3
Published 2007
Table of Contents: ... Fuzzy Model with a Chain Model -- Singleton Representation of Fuzzy Set for Computing Fuzzy Model...
View full text
Electronic eBook
4
Published 2013
Table of Contents: ... for References -- Dynamic Alias Protection with Aliasing Contracts -- Fine-Grained Function Visibility...
View full text
Electronic eBook
5
Published 2006
Table of Contents: ... Computing for Virtual Laboratories -- Dependable Networks -- Algorithms for Failure Protection in Large IP...
View full text
Electronic eBook
6
Published 2010
Table of Contents: ... Trust in Cloud Computing -- SegSlice: Towards a New Class of Secure Programming Primitives...
View full text
Electronic eBook
7
by Ruan, Xiaoyu., Ruan, Xiaoyu.
Published 2014
Subjects: ...Software Engineering/Programming and Operating Systems. https://scigraph.springernature.com...
View full text
Electronic eBook
8
Published 2006
Table of Contents: ...: Distributed Computing and Algorithms I -- Programmer-Centric Conditions for Itanium Memory Consistency -- A...
View full text
Electronic eBook
9
Published 2008
Table of Contents: ...Tutorials and Invited Lectures -- Inter-deriving Semantic Artifacts for Object-Oriented Programming...
View full text
Electronic eBook
10
Published 2014
Table of Contents: ... Wildlife Sanctuary -- 5: Major resource use from protected areas by local communities: A case of harvesting...
View full text
Electronic eBook
11
by Prince, Robert., Prince, Robert.
Published 2012
Table of Contents: ... Protection -- Demarcation of Radiological Zones -- Operational Radiation Protection -- Exposure Management...
View full text
Electronic eBook
12
Published 2010
Table of Contents: ... Facing Government Use of Cloud Computing -- Open Source Software (OSS) Adoption Framework for Local...
View full text
Electronic eBook
13
Published 2012
Table of Contents: ... of Quality Metrics for Functional Safety in Systems of Cooperative Vehicles -- From Autonomous Vehicles...
View full text
Electronic eBook
14
Published 2007
Table of Contents: ... for Nuclear Digital Protection System -- Specification of a Software Common Cause Analysis Method -- Combining...
View full text
Electronic eBook
15
Published 2010
Table of Contents: ...Bridging Calculus and Statistics: Null - Hypotheses Underlain by Functional Equations...
View full text
Electronic eBook
16
Published 2010
Table of Contents: ... Measurement for Reactor Protection System Software Implemented in Function Block Diagram -- Session 6...
View full text
Electronic eBook
17
Published 2007
Table of Contents: ...Roadmapping and i-Systems -- Exploring Computational Scheme of Complex Problem Solving Based...
View full text
Electronic eBook
18
Published 2012
Table of Contents: ... Noise Generation Strategy for Privacy Protection in Cloud Computing.-ARIMA Model-Based Web Services...
View full text
Electronic eBook
19
Subjects: ...Data protection....
View full text
Electronic eBook
20
Published 2008
Table of Contents: ...Podium Presentations -- Optimization with Genetic Algorithms and Splines as a way for Computer...
View full text
Electronic eBook