Your search for 38332 returns 3478 document(s) |
A format-independent architecture for run-time integrity checking of executable code, (LNCS-Lecture Notes in Computer Science 2576) Hal 219-233 |
Author: Luigi Catuogno; Ivan Visconti; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Deadlock checking using net unfoldings, (LNCS-Lecture Notes in Computer Science 1254) Hal 352-363 |
Author: Stephan Melzer; Stefan Romer; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Termilog: a system for checking termination of queries to logic programs, (LNCS-Lecture Notes in Computer Science 1254) Hal 444-447 |
Author: N. Lindenstrauss; Y. Sagiv; A. Serebrenik; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
TermiLong: a system for checking termination of queries to logic programs, (LNCS-Lecture Notes in Computer Science 1254)Hal. 444-447 |
Author: N. Lindenstrauss, Y. Sagiv; A. Serebernik; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Deadlock checking using net unforldings, (LNCS-Lecture Notes in Computer Science 1254) Hal. 352-363 |
Author: Stephan Melzer and Stefan Romer; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Logic in Computer Science: An Automata-Theoretic Approach to Branching-Time Model Checking |
Author: O. Kupferman, [et all] | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Efficient checking of behavioural relations and modal assertions using fixed-point inversion, (LNCS-Lecture Notes in Computer Science 939) Hal 142-154 |
Author: Henrik Reif Andersen; Bart Vergauwen; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Deployment value model for inrusion detection sensors, (LNCS-Lecture Notes in Computer Science 5576) Hal. 250-260 |
Author: Siraj A. Shaikh; Howard Chivers; Philip Nobles; John A. Clark; Hao Chen; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Honeybee-based model to detect intrusion, (LNCS-Lecture Notes in Computer Science 5576) Hal. 598-607 |
Author: Ghassan Ahmed Ali; Aman Jantan; Abdulghani Ali; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A New Notion of Soundness in bare public-key model, (LNCS-Lecture Notes in Computer Science 2576) Hal 318-325 |
Author: Shirley H.C. Cheung; Xiaotie Deng; C.H. Lee; Yunlei Zhao; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|