Search Result Save to File Save as CSV
Your search for 38761 returns 3968 document(s)
Hybrid probabilistic logic programs with non-monotonic negation, (LNCS-Lecture Notes in Computer Science 3668) Hal 204-220
Author: Emad Saad; Enrico Pontelli; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A Note on abstract interpretation strategies for hybrid automata, (LNCS-Lecture Notes in Computer Science 999)Hal. 252-293
Author: Thomas A. Henzinger; | Call Number: 005.369 Ant h | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Programming in hybrid constraint languages, (LNCS-Lecture Notes in Computer Science 999)Hal. 226-251
Author: Vincent Gupta; Radha Jagadeesan; Vijay Saraswat; | Call Number: 005.369 Ant h | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Hierarchical hybrid control: a case study, (LNCS-Lecture Notes in Computer Science 999) Hal. 166-190
Author: Datta N. Gondhole; John Lygeros and Shankar Sastry; | Call Number: 005.369 Ant h | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Error control scheme of hybrid ARQ based on majority voting bit by bit, (LNCS-Lecture Notes in Computer Science 5576) Hal. 563-569
Author: Hsin-Kun Lai, Chia-Chin Ma, Eri-Huel Lu; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Selective regression test for access control systems employing RBCA,(LNCS-Lecture Notes in Computer Science 5576) Hal. 70-79
Author: Chao Huang; Jianling Sun; Xinyu Wang; Yuanjie Si; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Attack pattern discovery by frequent episodes mining from honeypot systems, (LNCS-Lecture Notes in Computer Science 5576) Hal. 301-316
Author: Ming Yang Su, Kai Chi Chang; Chun-Yuen Lin; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Modelling and evaluating trust relationships in mobile agents based systems, (LNCS-Lecture Notes in Computer Science 2576) Hal 176-190
Author: Ching Lin; Vijay Varadharajan; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Task-Parallel programming of reconfigurable systems, (LNCS-Lecture Notes in Computer Science 2147) Hal 172-181
Author: Markus Weinhardt; Wayne Luk; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
The systolic ring : a dynamically reconfigurable architecture for embedded systems, (LNCS-Lecture Notes in Computer Science 2147) Hal 409-419
Author: Gilles Sassatelli; Lionel Torres; Jerome Galy; Gaston Cambon; Camille Diou; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next