Your search for 38886 returns 2455 document(s) |
Parametrized verification of linear networks using automata as invariants, (LNCS-Lecture Notes in Computer Science 1254)Hal. 412-423 |
Author: A. Prasad Sistia; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On combining formal and informal verification, (LNCS-Lecture Notes in Computer Science 1254)Hal. 376-387 |
Author: Jun Yuan; Jian Shen; Jacob Abraham; Adnan Azis; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Formalization and verification of interaction protocols, ((LNCS-Lecture Notes in Computer Science 3668) Hal 437-438 |
Author: Federico Chesani; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Verification of hybrid systems using abstraction ((LNCS-Lecture Notes in Computer Science 999), Hal. 359-390 |
Author: Anuj Puri and Pravin Varniya; | Call Number: 005.369 Ant h | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On the automatic verification of systems with continous variables and unbounded discrete data structures, (LNCS-Lecture Notes in Computer Science 999) |
Author: Ahmed BBouajjani; Rachid Echahed; Riadh Robbana; | Call Number: 005.369 Ant h | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Verification of coccurent program temporal proof principles, (LNCS-Lecture Notes in Computer Science 131) Hal. 200- 252 |
Author: Zohar Manna; Amir Pneuli; | Call Number: 004 Lec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A comparative analysis of HC-128 and rabbit encryption schemes for pervasive computing in WSN environment, (LNCS-Lecture Notes in Computer Science 5576) Hal 682-691 |
Author: Firdous Kausar; Ayesha Naureen; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A comparative analysis of PKC and semi-PKC based key management schemes for hierarchical sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 692-701 |
Author: Ayesha Naureen; Attiya Akram; Rabia Riaz; Ki-Hyung Kim; H. Farooq Ahmed; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computing the M=UU t integer matrix decomposition, Efficient key updating signaturn schemes based on IBS, LNCS-Lecture Notes in Computer Science 2898), Hal. 223-233 |
Author: Katharina Geibler and Nigel P. Smart; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptanalysis of the public key cryptosystem based, Efficient key updating signaturn schemes based on IBS, LNCS-Lecture Notes in Computer Science 2898), Hal. 234-244 |
Author: George Petricles; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|