Search Results - "executed"
Suggested Topics within your search.
Suggested Topics within your search.
- Politics & government 45
- Social & cultural history 40
- British & Irish history 28
- History of science 28
- Psychology 28
- Medicine 26
- History 25
- Neurosciences 25
- Computer science 24
- Public administration 24
- Law 22
- Society & social sciences 22
- Political structure & processes 20
- Technology: general issues 20
- Software Engineering 19
- Biography & True Stories 18
- Humanities 17
- Management 17
- Business 16
- Political science 16
- Comparative politics 15
- Political science & theory 15
- Business ethics & social responsibility 14
- Dictionaries of biography (Who's Who) 14
- Education 14
- International relations 14
- Business strategy 13
- Computing & information technology 13
- History of engineering & technology 13
- Sociology 13
-
2381
-
2382
-
2383
-
2384
-
2385
-
2386
-
2387
-
2388
-
2389
-
2390
-
2391
-
2392
-
2393
-
2394
-
2395
Tools and Algorithms for the Construction and Analysis of Systems 28th International Conference, TACAS 2022, Held as Part of the European Joint Conferences on Theory and Practice o...
Published 2022Table of Contents: “…Probabilistic Systems -- A Probabilistic Logic for Verifying Continuous-time Markov Chains -- Under-Approximating Expected Total Rewards in POMDPs -- Correct Probabilistic Model Checking with Floating-Point Arithmetic -- Correlated Equilibria and Fairness in Concurrent Stochastic Games -- Omega Automata -- A Direct Symbolic Algorithm for Solving Stochastic Rabin Games -- Practical Applications of the Alternating Cycle Decomposition -- Sky Is Not the Limit: Tighter Rank Bounds for Elevator Automata in Büchi Automata Complementation -- On-The-Fly Solving for Symbolic Parity Games -- Equivalence Checking -- Distributed Coalgebraic Partition Refinement -- From Bounded Checking to Verification of Equivalence via Symbolic Up-to Techniques -- Equivalence Checking for Orthocomplemented Bisemilattices in Log-Linear Time -- Monitoring and Analysis -- A Theoretical Analysis of Random Regression Test Prioritization -- Verified First-Order Monitoring with Recursive Rules -- Maximizing Branch Coverage withConstrained Horn Clauses -- Efficient Analysis of Cyclic Redundancy Architectures via Boolean Fault Propagation -- Tools / Optimizations, Repair and Explainability -- Adiar: Binary Decision Diagrams in External Memory -- Forest GUMP: A Tool for Explanation -- Alpinist: an Annotation-Aware GPU Program Optimizer -- Automatic Repair for Network Programs -- 11th Competition on Software Verification / SV-COMP 2022 -- Progress on Software Verification: SV-COMP 2022 -- AProVE: Non-Termination Witnesses for C Programs (Competition Contribution) -- BRICK: Path Enumeration Based Bounded Reachability Checking of C Program (Competition Contribution) -- A Prototype for Data Race Detection in CSeq 3 (Competition Contribution) -- Dartagnan: SMT-based Violation Witness Validation (Competition Contribution) -- Deagle: An SMT-based Veri er for Multi-threaded Programs (Competition Contribution) -- The Static Analyzer Frama-C in SV-COMP (Competition Contribution) -- GDart: An Ensemble of Tools for Dynamic Symbolic Execution on the Java Virtual Machine (Competition Contribution) -- Graves-CPA: A Graph-Attention Veri er Selector (Competition Contribution) -- GWIT: A Witness Validator for Java based on GraalVM (Competition Contribution) -- The Static Analyzer Infer in SV-COMP (Competition Contribution) -- LART: Compiled Abstract Execution (Competition Contribution) -- Symbiotic 9: String Analysis and Backward Symbolic Execution with Loop Folding (Competition Contribution) -- Symbiotic-Witch: A Klee-Based Violation Witness Checker (Competition Contribution) -- Theta: portfolio of CEGAR-based analyses with dynamic algorithm selection -- Ultimate GemCutter and the Axes of Generalization (Competition Contribution) -- Wit4Java: A Violation-Witness Validator for Java Verifiers (Competition Contribution).…”
Link to Metadata
Electronic eBook -
2396
Rational Cybersecurity for Business The Security Leaders' Guide to Business Alignment /
Published 2020Table of Contents: “…Chapter 1: Executive Overview -- Chapter 2: Identify and Align Security-Related Roles -- Chapter 3: Put the Right Security Governance Model in Place -- Chapter 4: Strengthen Security Culture through Effective Communications and Awareness Programs -- Chapter 5: Manage Risk in the Language of Business -- Chapter 6: Establish a Control Baseline -- Chapter 7: Simplify and Rationalize IT and Security -- Chapter 8: Control Access with Minimal Drag on the Business -- Chapter 9: Institute Resilience Through Detection, Response, and Recovery -- Chapter 10: Create Your Rational Cybersecurity Success Plan -- Glossary of Terms and Acronyms. .…”
Link to Metadata
Electronic eBook -
2397
META-NET Strategic Research Agenda for Multilingual Europe 2020
Published 2013Table of Contents: “…Key Messages -- Executive Summary -- 1.Introduction -- 2.Multilingual Europe: Facts, Challenges, Opportunities -- 3.Major Trends in Information and Communication Technologies -- 4.Language Technology 2012: Current State and Opportunities -- 5.Language Technology 2020: The META-NET Technology Vision -- 6.Language Technology 2020: Priority Research Themes -- 7.Towards a Shared European Programme for Multilingual Europe 2020: Next Steps -- A.References -- B.List of Key Contributors -- C.Milestones and History of the Strategic Research Agenda -- D.About META-NET -- E.Members of META-NET -- F.Abbreviations and Acroynms.…”
Link to Metadata
Electronic eBook -
2398
Strategic Management
Published 2020Table of Contents: “…Chapter 9: Competing in International Markets -- X. Chapter 10: Executing Strategy through Organizational Design -- XI. …”
Access online version
Electronic eBook -
2399
-
2400