Search Result Save to File Save as CSV
Your search for 38804 returns 5368 document(s)
Compositional verification of synchronous networks, (LNCS-Lecture Notes in Computer Science 1926) Hal 214-227
Author: Leszek Holenderski; | Call Number: 004.33 Jos f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Safety verification for automated platoon maneuvers: a case study, (LNCS-Lecture Notes in Computer Science 1201) Hal 154-170
Author: Ekaterina Dolginova; Nancy Lynch; | Call Number: 004.33 Mal h | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Data-structures for the verification of timed automata, (LNCS-Lecture Notes in Computer Science 1201) Hal 346-360
Author: Eugene Asarin; Marius Bozga; Alain Kerbrat; Oded Maler; Amir Pnueli; Anne Rasse; | Call Number: 004.33 Mal h | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
STARI: a case study in compositional and hierarchial timing verification, (LNCS-Lecture Notes in Computer Science 1254) Hal 191-201
Author: Serdar Tasiran; Robert K. Brayton; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Parametrized verification of linear networks using automata as invariants, (LNCS-Lecture Notes in Computer Science 1254) Hal 412-423
Author: A. Prasad Sistla; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
SMC: a symmetry based model checker for verification of liveness properties, (LNCS-Lecture Notes in Computer Science 1254) Hal 464-467
Author: A. P. Sistla; L. Miliades; V. Gyuris; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
On signature schemes with threshold verification detecting malicious verifiers, (LNCS-Lecture Notes in Computer Science 1361) Hal 67-78
Author: Holger Petersen; Markus Michels; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
The industrial success of verification tools based on stalmarck's method, (LNCS-Lecture Notes in Computer Science 1254) Hal 7-10
Author: Arne Boralv; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Using compositional preorders in the verification of sliding window protocol, (LNCS-Lecture Notes in Computer Science 1254) Hal 48-59
Author: Roope Kaivola; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Verification of a chemical process leak test procedure, (LNCS-Lecture Notes in Computer Science 1254) Hal 84-94
Author: Adam L. Turk; Scott T. Probst; Gary J. Powers; | Call Number: 004 Int c | Edition: (LNCS-Lecture Notes in Computer Science 985) | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next