<--- Back to Details
First PageDocument Content
Concepts / Conceptual model / Metaphor / Conceptual framework / Deliverable / Software development process / Mind / Ethology / Philosophy of mind
Date: 2014-11-11 06:27:06
Concepts
Conceptual model
Metaphor
Conceptual framework
Deliverable
Software development process
Mind
Ethology
Philosophy of mind

Add to Reading List

Source URL: www.devotes-project.eu

Download Document from Source Website

File Size: 275,58 KB

Share Document on Facebook

Similar Documents

Cryptocurrencies / Economy / Money / Finance / Counterparty / Initial coin offering / Blockchain / Bitcoin / Tokenization / Tether / Ethereum / Smart contract

Conceptual Framework for Legal & Risk Assessment of Blockchain Crypto Property (BCP) The New Property on the Block The age of tokenized ecosystems has begun – the shift from centralized to decentralized blockchain-base

DocID: 1xVtc - View Document

Cryptography / Public-key cryptography / Transport Layer Security / Key management / Public key infrastructure / Man-in-the-middle attack / Secure Shell / Forward secrecy / Elliptic-curve DiffieHellman / Replay attack / Cryptographic protocol / Handshaking

Designing a Secret Handshake: Authenticated Key Exchange as a Capability System Dominic Tarr July 10, 2015 Abstract Capability Based Security is a conceptual framework for designing

DocID: 1xUQb - View Document

Theoretical computer science / Formal methods / Computing / Mathematics / Logic in computer science / Graph rewriting / Model checking / Algorithm / Formal verification / Abstraction / Generic programming / Finite-state machine

An Object-Oriented Framework for Explicit-State Model Checking Mark Kattenbelt1 and Theo C. Ruys2 and Arend Rensink2 Abstract. This paper presents a conceptual architecture for an object-oriented framework to support the

DocID: 1xUvv - View Document

Cryptocurrencies / Economy / Money / Finance / Counterparty / Blockchain / Bitcoin / Tether / Smart contract / Ethereum / Tokenization

Conceptual Framework for Legal & Risk Assessment of Blockchain Crypto Property (BCP) Dr. Luka Müller, Stephan D. Meyer, Christine Gschwend, Peter Henschel Genesis Version

DocID: 1xUnq - View Document

Cryptography / Public-key cryptography / Transport Layer Security / Key management / Public key infrastructure / Man-in-the-middle attack / Secure Shell / Forward secrecy / Elliptic-curve DiffieHellman / Replay attack / Cryptographic protocol / Handshaking

Designing a Secret Handshake: Authenticated Key Exchange as a Capability System Dominic Tarr July 10, 2015 Abstract Capability Based Security is a conceptual framework for designing

DocID: 1xT6c - View Document