1
by Cohen, Ryan.
Published 2014
Format:
Table of Contents: ... Layer -- Application Layer -- Special Difficulties of Embedded Application Development -- Summary...
Click to View
2
by Sato, Mitsuhisa.
Published 2020
Format:
Table of Contents: ...3.1 Overview -- 3.2 YML -- 3.3 OmniRPC-MPI -- 4 Application Development in the mSPMD Programming...
Click to View
3
4
by Gregory, Peggy.
Published 2021
Format:
Table of Contents: ....1 Implementing Ethics into Software Development -- 2.2 ECCOLA Method and It's Application -- 2.3 User Stories...
Click to View
5
by Nebel, Mathias.
Published 2022
Format:
Table of Contents: ... Need a Common Good Approach? -- 3. A Common Good Approach to Development. Where Do We Stand? -- 4. Does...
Click to View
6
by Yuan, Philip F.
Published 2021
Format:
Table of Contents: ... -- References -- The Development of 'Agent-Based Parametric Semiology' as Design Research Program -- 1 Theory...
Click to View
7
by Yuan, Philip F.
Published 2021
Format:
Table of Contents: ... Programs and Micro-structures -- 5 Façade Development and Sunlight Optimization -- 6 Conclusion...
Click to View
8
by Lysne, Olav.
Published 2018
Format:
Table of Contents: ... in Vendors Is Different from Computer Security -- 1.7 Why the Problem Is Important -- 1.8 Advice for Readers...
Click to View
9
by Galis, Alex.
Published 2013
Format:
Table of Contents: ... -- Computing and Networking Clouds -- Contrail: Distributed Application Deployment under SLA in Federated...
Click to View
10
by Cochez, Michael.
Published 2021
Format:
Table of Contents: ... Relations in Layered Enterprise Architecture Development -- 1 Introduction -- 2 The Metamodel Diagram -- 3...
Click to View
11
by Domingue, John.
Published 2011
Format:
Table of Contents: ...Ontology at Network Layers -- Entity Title Model Concepts and Semantics -- Cross Layer Ontology...
Click to View
12
by Holzinger, Andreas.
Published 2022
Format:
Table of Contents: ... Agnostic Explanations) -- 2.2 Anchors -- 2.3 GraphLIME -- 2.4 Method: LRP (Layer-wise Relevance Propagation...
Click to View
13
by Cheruvu, Sunil.
Published 2019
Format:
Table of Contents: ... -- Stuxnet -- Designing Safe and Secure Cyber-Physical Systems -- Constrained Computing and Moore's Law...
Click to View
14
by Nayak, Umesha.
Published 2014
Format:
Table of Contents: ... Program -- Chapter 2: History of Computer Security -- Introduction -- Communication -- World Wars...
Click to View
15
by Gruhn, Volker.
Published 2018
Format:
Table of Contents: ... for Deviceless Edge Computing -- 4.1 Programming Support for Deviceless Edge Functions -- 4.2 Intents and Intent...
Click to View
16
by Onoda, Masami.
Published 2017
Format:
Table of Contents: ... Imaging Program -- 3.1.4 Decadal Survey for Earth Science and Applications from Space -- 3.2 Quantifying...
Click to View
17
by Reussner, Ralf.
Published 2019
Format:
Table of Contents: ... Model Information with Program Code -- 9.3.2 Application: Security Evolution Scenario -- 9.3.3 Security...
Click to View
18
by Sasaki, Keiichi.
Published 2014
Format:
Table of Contents: ... -- 3.4 Protein Application -- 3.5 Application of Motif-Programming -- 3.6 Plasma Treatment of Implant...
Click to View
19
by Youssef, Ali.
Published 2014
Format:
Table of Contents: ... -- Wi-Fi Alliance -- Core Programs -- Optional Programs -- International Organization...
Click to View
20
by Tolio, Tullio.
Published 2019
Format:
Table of Contents: ... Approach -- 13.4 Developed Technologies, Methodologies and Tools -- 13.4.1 Development of Functional Layer...
Click to View