Search Result Save to File Save as CSV
Your search for 38167 returns 5224 document(s)
Verifying hybrid systems modeled as timed automata: a case study, (LNCS-Lecture Notes in Computer Science 1201) Hal 171-185
Author: Myla Archer; Constance heitmeyer; | Call Number: 004.33 Mal h | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
STARI: a case study in compositional and hierarchial timing verification, (LNCS-Lecture Notes in Computer Science 1254) Hal 191-201
Author: Serdar Tasiran; Robert K. Brayton; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A concurrency case study using RAISE, (LNCS-Lecture Notes in Computer Science 670) Hal 367-387
Author: Anne Haxthausen; Chris George; | Call Number: 004 Woo f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Hierarchical hybrid control: a case study, (LNCS-Lecture Notes in Computer Science 999) Hal. 166-190
Author: Datta N. Gondhole; John Lygeros and Shankar Sastry; | Call Number: 005.369 Ant h | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Using the web information structures for retrieving web pages, (LNCS-Lecture Notes in Computer Science 4022), Hal. 892-897
Author: Mirna Adriani and Rama Pandugita; | Call Number: 025.004 Acc | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Differential fault analysis on A.E.S, (LNCS-Lecture Notes in Computer Science 2576) Hal 293-306
Author: Pierre Dusart; Gilles Letourneux; Olivier Vivolo; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Initial analysis of the proteus architecture, (LNCS-Lecture Notes in Computer Science 2147) Hal 623-627
Author: Michael Dales; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
PS-LTL for constraint-based security protocol analysis, (LNCS-Lecture Notes in Computer Science 3668) Hal 439-440
Author: Ricardo Corin; Ari Saptawijaya; Sandro Etalle; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Analysis and optimization of CHR programs, (LNCS-Lecture Notes in Computer Science 3668) Hal 450-451
Author: Jon Sneyers; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Analysis of involutional ciphers: khazad and anubis, (LNCS-Lecture Notes in Computer Science 2887) Hal 45-53
Author: Alex Biryukov; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next