Search Result Save to File Save as CSV
Your search for 38831 returns 3629 document(s)
Nondeterminism analysis of functional logic programs, (LNCS-Lecture Notes in Computer Science 3668) Hal 265-279
Author: Bernd Brarel; Michael Hanus; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Polynomial interpretations as a basis for termination analysis of logic programs, (LNCS-Lecture Notes in Computer Science 3668) Hal 311-325
Author: Manh Thang Nguyen; Danny De Schreye; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Semantics of framed temporal logic programs, LNCS-Lecture Notes in Computer Science 3668) Hal 356-370
Author: Zhenhua Duan; Xiaoxiao Yang; Maciej Koutny; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A generic framework for the analysis and specialization of logic programs, ( (LNCS-Lecture Notes in Computer Science 3668) Hal 407-409
Author: German Puebla; Elvira Albert; Manuel Hermenegildo; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Synthesis of communicating progresses from temporal logic specifications, (LNCS-Lecture Notes in Computer Science 131) Hal. 253-281
Author: Zohar Manna; Pierre Wolper; | Call Number: 004 Lec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Design and synthesis of synchronization skeletons using brancing time temporal logic, (LNCS-Lecture Notes in Computer Science 131) Hal. 52-71
Author: Edmund M. Clarke; | Call Number: 004 Lec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
The refinements and the stability of hoare logic, (LNCS-Lecture Notes in Computer Science 131)Hal. 24-36
Author: J.A. Berostra; J. V. Tucker; | Call Number: 004 Lec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Hoare's logic incomplete when it does not have to be, (LNCS-Lecture Notes in Computer Science 131) Hal. 9-23
Author: J. Bergstra; | Call Number: 004 Lec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A Deployment value model for inrusion detection sensors, (LNCS-Lecture Notes in Computer Science 5576) Hal. 250-260
Author: Siraj A. Shaikh; Howard Chivers; Philip Nobles; John A. Clark; Hao Chen; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Honeybee-based model to detect intrusion, (LNCS-Lecture Notes in Computer Science 5576) Hal. 598-607
Author: Ghassan Ahmed Ali; Aman Jantan; Abdulghani Ali; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   2 3 4 5 6 7 8 9 10 11  Next