Your search for 38749 returns 4879 document(s) |
From duration calculus to linear hybrid automata (extended abstract), (LNCS-Lecture Notes in Computer Science 939) Hal 196-210 |
Author: Ahmed Bouajjani; Yassine Lakhnech; Riadh Robbana; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Hybrid probabilistic logic programs with non-monotonic negation, (LNCS-Lecture Notes in Computer Science 3668) Hal 204-220 |
Author: Emad Saad; Enrico Pontelli; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Note on abstract interpretation strategies for hybrid automata, (LNCS-Lecture Notes in Computer Science 999)Hal. 252-293 |
Author: Thomas A. Henzinger; | Call Number: 005.369 Ant h | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Programming in hybrid constraint languages, (LNCS-Lecture Notes in Computer Science 999)Hal. 226-251 |
Author: Vincent Gupta; Radha Jagadeesan; Vijay Saraswat; | Call Number: 005.369 Ant h | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Hierarchical hybrid control: a case study, (LNCS-Lecture Notes in Computer Science 999) Hal. 166-190 |
Author: Datta N. Gondhole; John Lygeros and Shankar Sastry; | Call Number: 005.369 Ant h | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Error control scheme of hybrid ARQ based on majority voting bit by bit, (LNCS-Lecture Notes in Computer Science 5576) Hal. 563-569 |
Author: Hsin-Kun Lai, Chia-Chin Ma, Eri-Huel Lu; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Cryptanalytic view of the NSA's skipjack block cipher design, (LNCS-Lecture Notes in Computer Science 5576) Hal. 368-381 |
Author: Jongsung Kim; Raphael C.W. Phan; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Design and delivery of undergraduate IT security management course, (LNCS-Lecture Notes in Computer Science 5576) Hal. 402-411 |
Author: Jemal H. Abawaijy; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Some application of polynomials for the design of cryptographic protocols, (LNCS-Lecture Notes in Computer Science 2576) Hal 1-13 |
Author: Eyal Kushilevitz; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Development of a design framework for platform-independent networked reconfiguration of software and hardware, (LNCS-Lecture Notes in Computer Science 2147) Hal 264-274 |
Author: Yajun Ha; Bingfeng Mei; Patrick Schaumont; Serge Vernalde; Rudy Lauwereins; Hugo De Man; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|