Search Result Save to File Save as CSV
Your search for 38286 returns 3068 document(s)
Trace theoretic verification of asynchronous circuits using unfoldings, (LNCS-Lecture Notes in Computer Science 939) Hal 180-195
Author: K. L. McMillan; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Performance evaluation of DSR in multi-services ad hoc networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 432-437
Author: Ronald Beaubrun; Badji Molo; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Implementation and evaluation of WiMedia MAC LSI, (LNCS-Lecture Notes in Computer Science 5576) Hal. 438-450
Author: Kazuyuki Sakoda; Yuichi Morioka; Chihiro Fujita; Erica Tanimoto; Kenzoh Nishikawa, Mitsurhiro Suzuki; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Dynamic mixed-strategy evaluation of tabled logic programs, (LNCS-Lecture Notes in Computer Science 3668) Hal 250-264
Author: Ricardo Rocha; Fernando Silva; Vitor Santos Costa; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Sequencer circuits for VLSI programming; Hal. 82-90
Author: Andrew Bailey; Mark B. Joseph; | Call Number: SEM-234 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Mind the gaps: a new splitting strategy for consis1tency techniques, (LNCS-Lecture Notes in Computer Science 3709) Hal 77-91
Author: Heikel Batnini; Claude Michel; Michel Rueher; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
On solving soft temporal constraints using sat techniques, (LNCS-Lecture Notes in Computer Science 3709) Hal 607-621
Author: Hossein M. Sheini; Bart Peintner; Karem A. Sakallah; Martha E. Pollack; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Blocking techniques in numerical software, (LNCS-Lecture Notes in Computer Science 1557) Hal 127-139
Author: Wilfried N. Gansterer; Dieter F. Kvasnicka; Cristoph W. Ueberhuber; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Boolean and 2-adic numbers based techniques for verifying synchronous designs, (LNCS-Lecture Notes in Computer Science 1254) Hal 303
Author: Gerard Berry; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Entity authentication and authenticated key transport protocols employing asymmetric techniques, (LNCS-Lecture Notes in Computer Science 1361) Hal 137-158
Author: Simon Blake-Wilson; Alfred Menezes; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next