Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: %((22weak interaction) or (weak interaction))%22
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"005 - Computer programming, programs & data"
Search alternatives
:
22weak interaction »
weak interactions
,
wear interaction
,
work interaction
weak interaction »
weak interactions
Showing
1
-
14
of
14
Search:
'%((22weak interaction) or (weak interaction))%22'
,
query time: 2.01s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Computer Vision in Human-Computer
Interaction
: ICCV 2005 Workshop on HCI, Beijing, China, October 21, 2005, Proceedings
Published 2005
Springer Berlin Heidelberg
Table of Contents:
“
...Multimodal Human Computer
Interaction
: A Survey -- Multimodal Human Computer
Interaction
: A Survey...
”
Read Now
2
Rewriting Techniques and Applications : 12th International Conference, RTA 2001, Utrecht, The Netherlands, May 22-24, 2001. Proceedings
Published 2001
Springer Berlin Heidelberg
Table of Contents:
“
... Papers -- Universal
Interaction
Systems with Only Two Agents -- General Recursion on Second Order Term...
”
Read Now
3
Rewriting Techniques and Applications : 13th International Conference, RTA 2002, Copenhagen, Denmark, July 22-24, 2002 Proceedings
Published 2002
Springer Berlin Heidelberg
Table of Contents:
“
... Strategies -- Rewrite Games -- An Extensional Böhm Model -- A
Weak
Calculus with Explicit Operators...
”
Read Now
4
Advances in Cryptology — CRYPTO ’96 : 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18–22, 1996, Proceedings
Published 1996
Springer Berlin Heidelberg
Table of Contents:
“
... and Anonymous Cash -- Asymmetric Systems --
Weaknesses
in Some Threshold Cryptosystems -- Hidden Collisions...
”
Read Now
5
Advances in Cryptology — CRYPTO ’93 : 13th Annual International Cryptology Conference Santa Barbara, California, USA August 22–26, 1993 Proceedings
Published 1994
Springer Berlin Heidelberg
Table of Contents:
“
... and Their Propagation Characteristics -- Proof Systems and Zero-knowledge -- A Low Communication Competitive
Interactive
...
”
Read Now
6
Principles and Practice of Constraint Programming - CP '95 : First International Conference, CP '95, Cassis, France, September 19 - 22, 1995. Proceedings
Published 1995
Springer Berlin Heidelberg
Table of Contents:
“
... library for constructing
interactive
graphical user interfaces -- Model-based computing: Using concurrent...
”
Read Now
7
97 Things Every UX Practitioner Should Know
Published 2021
O'Reilly Media, Inc.
Table of Contents:
“
... -- Al Lopez -- Chapter 21. Advocate for Accessibility -- Holly Schroeder -- Chapter
22
. Design...
”
Call Number:
QA76.9.U83
Read Now
8
Computer Science Logic : 19th International Workshop, CSL 2005, 14th Annual Conference of the EACSL, Oxford, UK, August 22-25, 2005, Proceedings
Published 2005
Springer Berlin Heidelberg
Table of Contents:
“
... of Independence-Friendly Fixpoint Logic -- Closure Properties of
Weak
Systems of Bounded Arithmetic...
”
Read Now
9
Advances in Cryptology – CRYPTO 2019 : 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part III
Published 2019
Springer International Publishing
Table of Contents:
“
...
Weak
Pseudorandomness and Security Amplification -- Watermarking -- Watermarking PRFs from Lattices...
”
Read Now
10
Model-Driven Engineering and Software Development : 6th International Conference, MODELSWARD 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised Selected Papers
Published 2019
Springer International Publishing
Table of Contents:
“
... Languages: Extended Case Study -- Technology Enhanced Support for Learning
Interactive
Software Systems...
”
Read Now
11
Financial Cryptography and Data Security : 9th International Conference, FC 2005, Roseau, The Commonwealth Of Dominica, February 28 - March 3, 2005, Revised Papers
Published 2005
Springer Berlin Heidelberg
Table of Contents:
“
...User Authentication --
Interactive
Diffie-Hellman Assumptions with Applications to Password-Based...
”
Read Now
12
Automata, Languages and Programming : 36th International Colloquium, ICALP 2009, Rhodes, Greece, July 5-12, 2009, Proceedings, Part II
Published 2009
Springer Berlin Heidelberg
Table of Contents:
“
... and
Interacting
Particle Systems -- Derandomizing Random Walks in Undirected Graphs Using Locally Fair Exploration...
”
Read Now
13
Hunting security bugs
by
Gallagher, Tom
Published 2006
Microsoft Press
Table of Contents:
“
... Testing; 2.1 Threat Modeling;
2.2
How Testers Can Leverage a Threat Model; 2.3 Data Flow Diagrams; 2.4...
”
Call Number:
QA76.9.A25
Read Now
14
Cybersecurity risk management : mastering the fundamentals using the NIST cybersecurity framework
by
Brumfield, Cynthia
,
Haugli, Brian
Published 2022
John Wiley & Sons, Inc.
Table of Contents:
“
...-Factor Authentication Based on the Risk Involved in the
Interaction
33 -- III. Awareness and Training 34...
”
Call Number:
QA76.9.A25
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 005 - Computer programming, programs & data
Year of Publication
From:
To:
Classification
005 - Computer programming, programs & data
004 - Data processing & computer science
1
331 - Labor economics
1
368 - Insurance
1
500 - Natural sciences & mathematics
1
620 - Engineering & allied operations
1
more ...
658 - General management
1
see all ...
less ...
Language
English
14
Collection
Springer eBooks 2005-
6
Springer Book Archives -2004
5
O'Reilly
3
Author
Albers, Susanne
1
Berlin, Dan
1
Boldyreva, Alexandra
1
Brumfield, Cynthia
1
Gallagher, Tom
1
Hammoudi, Slimane
1
more ...
Haugli, Brian
1
Huang, Thomas S.
1
Jeffries, Bryan
1
Koblitz, Neal
1
Landauer, Lawrence
1
Lew, Michael S.
1
Marchetti-Spaccamela, Alberto
1
Matias, Yossi
1
Micciancio, Daniele
1
Middeldorp, Aart
1
Montanari, Ugo
1
Nikoletseas, Sotiris
1
Ong, Luke
1
Patrick, Andrew S.
1
Pires, Luís Ferreira
1
Rossi, Francesca
1
Sebe, Nicu
1
Selic, Bran
1
Stinson, Douglas R.
1
Tison, Sophie
1
Yung, Moti
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22005+-+Computer+programming%2C+programs+%26+data%22&lookfor=%25%28%2822weak+interaction%29+or+%28weak+interaction%29%29%2522&type=AllFields
Send by Email
×
Loading...