Search Result Save to File Save as CSV
Your search for 38691 returns 5557 document(s)
Development of a design framework for platform-independent networked reconfiguration of software and hardware, (LNCS-Lecture Notes in Computer Science 2147) Hal 264-274
Author: Yajun Ha; Bingfeng Mei; Patrick Schaumont; Serge Vernalde; Rudy Lauwereins; Hugo De Man; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Hardware-software partitioning: a reconfigurable and evolutionary computing approach, (LNCS-Lecture Notes in Computer Science 2147) Hal 595-600
Author: Jim Harkin; Thomas M. McGinnity; Liam P. Maguire; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Modeling constraint programs with software technology standards, (LNCS-Lecture Notes in Computer Science 3709) Hal 850
Author: Matthias Hoche; Stefan Jahnichen; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A provably correct embedded verifier for the certification on safety critical software, (LNCS-Lecture Notes in Computer Science 1254) Hal 202-213
Author: Alessandro Cimatti; Fausto Giunchiglia; Paolo Pecchiari; Bruno Pietra; Joe Profeta; Dario Romano; Paolo Traverso; Bing Yu; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Verisoft: a tool for the automatic analysis of concurrent reactive software, (LNCS-Lecture Notes in Computer Science 1254) Hal 476-479
Author: Patrice Godefroid; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Safety property verification of esterel programs and applications to telecommunications software, (LNCS-Lecture Notes in Computer Science 939) Hal 127-140
Author: Lalita Jategaonkar Jagadeesan; Carlos Puchol; James E. Von Olnhausen; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A provably correct embeded verifier for the certification of safety critical software, (LNCS-Lecture Notes in Computer Science 999)Hal. 202-231
Author: Alesandro Cimatti; Fausto Giunchiglia; Paolo Peechiari; Bruno Pietra; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Selective regression test for access control systems employing RBCA,(LNCS-Lecture Notes in Computer Science 5576) Hal. 70-79
Author: Chao Huang; Jianling Sun; Xinyu Wang; Yuanjie Si; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Attack pattern discovery by frequent episodes mining from honeypot systems, (LNCS-Lecture Notes in Computer Science 5576) Hal. 301-316
Author: Ming Yang Su, Kai Chi Chang; Chun-Yuen Lin; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Modelling and evaluating trust relationships in mobile agents based systems, (LNCS-Lecture Notes in Computer Science 2576) Hal 176-190
Author: Ching Lin; Vijay Varadharajan; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   3 4 5 6 7 8 9 10 11 12  Next