neleidžiama
neleidžiama
Skaitmeninių teisių valdymas (DRM)
Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).
Reikalinga programinė įranga
Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)
Norint skaityti šią el. knygą asmeniniame arba Mac kompiuteryje, Jums reikalinga Adobe Digital Editions (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas Adobe Reader, kurią tikriausiai jau turite savo kompiuteryje.)
Negalite skaityti šios el. knygos naudodami Amazon Kindle.
String Constraints with Regex-Counting and String-Length Solved More Efficiently.- Reachability Based Uniform Controllability to Target Set with Evolution Function.- Enhancing Branch and Bound for Robustness Verification of Neural Networks via An Effective Branching Strategy.- Graph-Based Log Anomaly Detection via Adversarial Training.- Formal Verification based Synthesis for Behavior Trees.- SeHBPL: Behavioral Semantics-Based Patch Presence Test for Binaries.- Session Types with Multiple Senders Single Receiver.- Understanding the Reproducibility Issues of Monkey for GUI Testing.- Multi-Dimensional Abstraction and Decomposition for Separation of Concerns.- Solving SMT Over Non-Linear Real Arithmetic via Numerical Sampling and Symbolic Verification.- Leveraging TLA+ Specifications to Improve the Reliability of the ZooKeeper Coordination Service.- Modeling Regex Operators for Solving Regex Crossword Puzzles.- Software Vulnerability Detection Using an Enhanced Generalization Strategy.- HeatC: a Variable-Grained Coverage Criterion for Deep Learning Systems.- Formalization of Lambda Calculus with Explicit Names as a Nominal Reasoning Framework.- Vulnerability Report Analysis and Vulnerability Reproduction for Web Applications.- Run-Time Assured Reinforcement Learning for Safe Spacecraft Rendezvous with Obstacle Avoidance.- An Abstract Domain of Linear Templates with Disjunctive Right-Hand-Side Intervals.- Deducing Matching Strings for Real-World Regular Expressions.- Binary Level Concolic Execution on Windows with Rich Instrumentation Based Taint Analysis.- Cheat-FlipIt: an Approach to Modeling and Perception of a Deceptive Opponent.- Making an eBPF Virtual Machine Faster on Microcontrollers: Verified Optimization and Proof Simplification.- Optimized Solutions for Highly Contended Transactional Workloads.- DeepTD: Diversity-Guided Deep Neural Network Test Generation.