Search Result Save to File Save as CSV
Your search for 38749 returns 4879 document(s)
From duration calculus to linear hybrid automata (extended abstract), (LNCS-Lecture Notes in Computer Science 939) Hal 196-210
Author: Ahmed Bouajjani; Yassine Lakhnech; Riadh Robbana; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Hybrid probabilistic logic programs with non-monotonic negation, (LNCS-Lecture Notes in Computer Science 3668) Hal 204-220
Author: Emad Saad; Enrico Pontelli; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A Note on abstract interpretation strategies for hybrid automata, (LNCS-Lecture Notes in Computer Science 999)Hal. 252-293
Author: Thomas A. Henzinger; | Call Number: 005.369 Ant h | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Programming in hybrid constraint languages, (LNCS-Lecture Notes in Computer Science 999)Hal. 226-251
Author: Vincent Gupta; Radha Jagadeesan; Vijay Saraswat; | Call Number: 005.369 Ant h | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Hierarchical hybrid control: a case study, (LNCS-Lecture Notes in Computer Science 999) Hal. 166-190
Author: Datta N. Gondhole; John Lygeros and Shankar Sastry; | Call Number: 005.369 Ant h | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Error control scheme of hybrid ARQ based on majority voting bit by bit, (LNCS-Lecture Notes in Computer Science 5576) Hal. 563-569
Author: Hsin-Kun Lai, Chia-Chin Ma, Eri-Huel Lu; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A Cryptanalytic view of the NSA's skipjack block cipher design, (LNCS-Lecture Notes in Computer Science 5576) Hal. 368-381
Author: Jongsung Kim; Raphael C.W. Phan; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Design and delivery of undergraduate IT security management course, (LNCS-Lecture Notes in Computer Science 5576) Hal. 402-411
Author: Jemal H. Abawaijy; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Some application of polynomials for the design of cryptographic protocols, (LNCS-Lecture Notes in Computer Science 2576) Hal 1-13
Author: Eyal Kushilevitz; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Development of a design framework for platform-independent networked reconfiguration of software and hardware, (LNCS-Lecture Notes in Computer Science 2147) Hal 264-274
Author: Yajun Ha; Bingfeng Mei; Patrick Schaumont; Serge Vernalde; Rudy Lauwereins; Hugo De Man; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next