Search Result Save to File Save as CSV
Your search for 38804 returns 5368 document(s)
Control synthesis for a class of hybrid systems subject to configuration-based safety constraints, (LNCS-Lecture Notes in Computer Science 1201) Hal 376-390
Author: Michael Heymann; Feng Lin; George Meyer; | Call Number: 004.33 Mal h | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Combining constraint solving and symbolic model checking for a class of systems with non-linear constraints, (LNCS-Lecture Notes in Computer Science 1254) Hal 316-327
Author: William Chan; Richard Anderson; Paul Beame; David Notkin; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
An improved reachability analysis method for strongly linear hybrid systems (extended abstract),(LNCS-Lecture Notes in Computer Science 1254) Hal 167-178
Author: Bernard Boigelot; Louis Bronne; Stephane Rassart; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Intelligent Informtion Access Systems (SINAI) at CLEF 2001: Calculating translation probabilites with SemCor, (LNCS-Lecture Notes in Computer Science, 2406), Hal. 185-192
Author: Fernando Martinez Santiago, L. ALfonso Urena Lopez, Ma. Carlos Diaz-Gaziano ...[et.al]; | Call Number: 025.04 Eva | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Multi-agent information system (MAIS) sebagai pendukung sistem saraf digital dalam implementasi sistem e-business, Hal. 3-6
Author: Aan Al Bone; | Call Number: SEM-270 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Relationship between motivation and satisfaction of online computer games: evidence from adolsescent players using wireless service in Taiwan, (LNCS-Lecture Notes in Computer Science 5576) Hal. 541-552
Author: Lily Shui-Lien Chen; Michael Chih-Hung Wang; Yung Hsin Lee; | Call Number: 005.3 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Digital networks and computer systems
Author: Booth, Taylor L.; | Call Number: 004 Boo d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Multy-party Computation from any linear secret sharing scheme unconditionally secure againts adaptive adversary: the zero-error case, (LNCS-Lecture Notes in Computer Science 2576) Hal 1-15
Author: Ventzislav Nikov; Svetla Nikova; Bart Preneel; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
3D face verification from range data, 47-51
Author: Juan Zhou, Yongping Li, Xinyu Ao, JingyanWang; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Formal Verification of a Group Membershiap Protocol Using Model (471-488)
Author: Valerio Rosset Pedro F. Souto Francisco Vasques; | Call Number: SEM-376 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   14 15 16 17 18 19 20 21 22 23  Next