Your search for 38286 returns 3068 document(s) |
Trace theoretic verification of asynchronous circuits using unfoldings, (LNCS-Lecture Notes in Computer Science 939) Hal 180-195 |
Author: K. L. McMillan; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Performance evaluation of DSR in multi-services ad hoc networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 432-437 |
Author: Ronald Beaubrun; Badji Molo; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Implementation and evaluation of WiMedia MAC LSI, (LNCS-Lecture Notes in Computer Science 5576) Hal. 438-450 |
Author: Kazuyuki Sakoda; Yuichi Morioka; Chihiro Fujita; Erica Tanimoto; Kenzoh Nishikawa, Mitsurhiro Suzuki; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Dynamic mixed-strategy evaluation of tabled logic programs, (LNCS-Lecture Notes in Computer Science 3668) Hal 250-264 |
Author: Ricardo Rocha; Fernando Silva; Vitor Santos Costa; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Sequencer circuits for VLSI programming; Hal. 82-90 |
Author: Andrew Bailey; Mark B. Joseph; | Call Number: SEM-234 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Mind the gaps: a new splitting strategy for consis1tency techniques, (LNCS-Lecture Notes in Computer Science 3709) Hal 77-91 |
Author: Heikel Batnini; Claude Michel; Michel Rueher; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On solving soft temporal constraints using sat techniques, (LNCS-Lecture Notes in Computer Science 3709) Hal 607-621 |
Author: Hossein M. Sheini; Bart Peintner; Karem A. Sakallah; Martha E. Pollack; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Blocking techniques in numerical software, (LNCS-Lecture Notes in Computer Science 1557) Hal 127-139 |
Author: Wilfried N. Gansterer; Dieter F. Kvasnicka; Cristoph W. Ueberhuber; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Boolean and 2-adic numbers based techniques for verifying synchronous designs, (LNCS-Lecture Notes in Computer Science 1254) Hal 303 |
Author: Gerard Berry; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Entity authentication and authenticated key transport protocols employing asymmetric techniques, (LNCS-Lecture Notes in Computer Science 1361) Hal 137-158 |
Author: Simon Blake-Wilson; Alfred Menezes; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|