Search Result Save to File Save as CSV
Your search for 38406 returns 4034 document(s)
Synthesis of communicating progresses from temporal logic specifications, (LNCS-Lecture Notes in Computer Science 131) Hal. 253-281
Author: Zohar Manna; Pierre Wolper; | Call Number: 004 Lec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Verification of coccurent program temporal proof principles, (LNCS-Lecture Notes in Computer Science 131) Hal. 200- 252
Author: Zohar Manna; Amir Pneuli; | Call Number: 004 Lec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Timesets : a new method for temporal reasoning about programs,(LNCS-Lecture Notes in Computer Science 131) Hal. 177-199
Author: Leslie Lamport 1; | Call Number: 004 Lec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A parallel strongly implicit algorithm for solving of diffusion equations, (LNCS-Lecture Notes in Computer Science 1557) Hal 78-84
Author: Ladislav Halada; Maria Lucka; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Solving irregular inter-processor data dependency in image understanding tasks, (LNCS-Lecture Notes in Computer Science 1557) Hal 236-245
Author: Yongwha Chung; Jin-Won Park; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Towards an integration of answer set and constraint solving, (LNCS-Lecture Notes in Computer Science 3668) Hal 52-66
Author: S. Baselice; P.A. Bonatti; M. Gelfond; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Control synthesis for a class of hybrid systems subject to configuration-based safety constraints, (LNCS-Lecture Notes in Computer Science 1201) Hal 376-390
Author: Michael Heymann; Feng Lin; George Meyer; | Call Number: 004.33 Mal h | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Blocking techniques in numerical software, (LNCS-Lecture Notes in Computer Science 1557) Hal 127-139
Author: Wilfried N. Gansterer; Dieter F. Kvasnicka; Cristoph W. Ueberhuber; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Boolean and 2-adic numbers based techniques for verifying synchronous designs, (LNCS-Lecture Notes in Computer Science 1254) Hal 303
Author: Gerard Berry; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Entity authentication and authenticated key transport protocols employing asymmetric techniques, (LNCS-Lecture Notes in Computer Science 1361) Hal 137-158
Author: Simon Blake-Wilson; Alfred Menezes; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next