Your search for 38458 returns 2560 document(s) |
Abduction of linear arithmetic constraints, (LNCS-Lecture Notes in Computer Science 3668) Hal 174-188 |
Author: Michael J.Maher; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Testing for termination with monotonicity constraints, (LNCS-Lecture Notes in Computer Science 3668) Hal 326-340 |
Author: Michael Coodish; Vitaly Lagoon; Peter J. Stuckey; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A mathematical approach towards trust based security in pervasive computing environment, (LNCS-Lecture Notes in Computer Science 5576) Hal 702-711 |
Author: Naima Iltaf; Mukhtar Hussain; Farrukh Kamran; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Towards a mechanization of cryptographic protocol verification, (LNCS-Lecture Notes in Computer Science 1254) Hal 131-142 |
Author: Dominique Bolignano; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Towards an implementation-oriented specification of TP protocol in LOTOS, (LNCS-Lecture Notes in Computer Science 670) Hal 93-109 |
Author: Ing Widya; Gert-Jan van der Heijden; | Call Number: 004 Woo f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Towards an integration of answer set and constraint solving, (LNCS-Lecture Notes in Computer Science 3668) Hal 52-66 |
Author: S. Baselice; P.A. Bonatti; M. Gelfond; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Towards implementations for advanced equivalence checking in answer-set programming, (LNCS-Lecture Notes in Computer Science 3668) Hal 189-203 |
Author: Hans Tompits; Stefan Woltran; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Towards a generalized interaction scheme for information access, LNCS-Lecture Notes in Computer Science 2942), Hal.291-301 |
Author: Yannis Tzitzikas; Carlo Meghini; Nicolas Spyratos; | Call Number: 006.33 Sei f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Hardware-based random number generation in wireless sensor(WSNs), (LNCS-Lecture Notes in Computer Science 5576) Hal 732-740 |
Author: Rabia Latif; Mukhtar Hussain; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Device authentication/ authorization protocol for home network in next generation security, (LNCS-Lecture Notes in Computer Science 5576) Hal 760-768 |
Author: Jong Sik Moon; Deok Gyu Lee; Im-Yeong Lee; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|