Free Delivery Over $100
76539 books were found.
The goal of the research presented was to find a way to effectively identify text data and instructions in a machine... Read More >>
Binary program analysis is a critical capability for offensive and defensive operations in Cyberspace. However,... Read More >>
Testing can be used during the software development process to maintain fidelity between evolving specifications,... Read More >>
This research creates a methodology and corresponding prototype for the transformation of object-oriented (00) specifications... Read More >>
This technical work delves into the design and analysis of online algorithms specifically tailored for finger searching.... Read More >>
""A Hierarchical Technique for Mechanical Theorem Proving and its Application to Programming Language Design"" explores... Read More >>
Routing protocols designed for wired networks cannot be used in mobile ad hoc networks (MANETs) due to the dynamic... Read More >>
This research presents an original emulation-based software protection scheme providing protection from reverse... Read More >>
GeoBEST (Base Engineer Survey Toolkit) is a software program built under contract with the USAF. It is designed... Read More >>
The research effort presented here is focused on the development of a basic mathematical model to simulate multiple... Read More >>
Round trip engineering of software from source code and reverse engineering of software from binary files have both... Read More >>
Routing in Mobile Ad Hoc Networks (MANETs) presents unique challenges not encountered in conventional networks.... Read More >>
Graphs express relationships among objects, such as the radio connectivity among nodes in unmanned vehicle swarms.... Read More >>
The pressure to decrease costs within the Department of Defense has influenced the start of many cost estimating... Read More >>
Agent Tool is an AFIT-produced, AFOSR-sponsored multi-agent system (MAS) development tool intended for production... Read More >>
Project managers typically set three success criteria for their projects: meet specifications, be on time, and be... Read More >>
Failed or troubled modernization efforts, such as the multi-million dollar 1997-2000 ROCC/SOCC failure, are a serious... Read More >>
The use of formal specifications allows for a software system to be defined with stringent mathematical semantics... Read More >>
This research focuses on how to reengineer Cobol legacy systems into object-oriented systems using Sward's Parameter... Read More >>
This paper presents a methodology for solving military aircraft load- scheduling problems modeled as a multidimensional... Read More >>
This research develops the Android Protection System (APS), a hardware-implemented application security mechanism... Read More >>
Today many organizations are faced with multiple large legacy data stores in different formats and the need to use... Read More >>
Protecting intellectual property contained in application source code and preventing tampering with application... Read More >>
Un libro di facile consultazione per gli studenti, con spiegazioni puntuali ed esempi pratici, Lecture Notes on... Read More >>
Unlock the fastest way to land your first paid developer job in just 30 days. This blueprint is designed for aspiring... Read More >>