Search Result Save to File Save as CSV
Your search for 37156 returns 71 document(s)
Emergency Operation Characteristics of Vehicle Driver (V1-250 -- V1-253)
Author: Jianqiang Gong Xiao Wei; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Symbolic logic & mechanical theorem proving/Chin-Liang Chang
Author: Chang, Chin Liang; | Call Number: 511.3 Cha s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Solving for set variables in higher-order theorem proving, Hal. 408-414
Author: Chad E. Brwon; | Call Number: SEM-281 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Lazy theorem proving for bounded model checking over infinite domains, Hal. 438-455
Author: Leonardo de Moura, Harald Rueb, Maria Sorea; | Call Number: SEM-281 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Logic for computer science : foundations of automatic theorem proving/ Jean H. Gallier
Author: Gallier, Jean H.; | Call Number: 511.3 Gal l | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Symbolic logic and mechanical theorem proving/ Chin-Liang Chang
Author: Chang, Chin-Liang; | Call Number: 511.3 Cha s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Automated Geometric Theorem Proving Diagram Generation and Applications (4)
Author: Xia-shan Gao; | Call Number: SEM-351 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Correctness of programs with functional procedures, (LNCS-Lecture Notes in Computer Science 131)Hal. 94-112
Author: J.W. de Bakker; | Call Number: 004 Lec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
On the correctness of scurity proofs for the 3GPP confidentiality and integrity algorithms, LNCS-Lecture Notes in Computer Science 2898), Hal. 206-318
Author: Testsu Iwata and Kaoru Kurosawa; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Analisa Hubungan Kapasilitas Data Text terhadap Execute Time dan Correctness pada Implementasi Metode Kriptografi RSA (26)
Author: Mike Yuliana Wirawan titon Dutono; | Call Number: SEM-307 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8  Next