Search Result Save to File Save as CSV
Your search for 38920 returns 3803 document(s)
Deductive multi-valued model checking, (LNCS-Lecture Notes in Computer Science 3668) Hal 297-310
Author: Ajay Mallya; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A General attack model on hash-based client puzzles, (LNCS-Lecture Notes in Computer Science 2898),Hal. 319-331
Author: Geraint Price; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Plan databases: model and algebra, (LNCS-Lecture Notes in Computer Science 2942), Hal. 302-319
Author: Fusun Yaman; Sibel adali; Dana Nau; Mria L. Supino and V.S. Subrahmanian; | Call Number: 006.33 Sei f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Toupie = u-calculus + constraints, (LNCS-Lecture Notes in Computer Science 939) Hal 114-126
Author: Antoine Rauzy; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Selecting the wireless communication methods for establishing ubiquitous city-gas facilities in Korea, (LNCS-Lecture Notes in Computer Science 5576) Hal 823-828
Author: Jeong Seok Oh; Jang Sik Park; Jeong Rock Kwon; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A class of explicit two-step runge-kutta methods with enlarged stability regions for parallel computers, (LNCS-Lecture Notes in Computer Science 1557) Hal 68-77
Author: Helmut Podhaisky; Rudiger Weiner; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
The industrial take-up of formal methods in safety-critical and other areas: a perspective, (LNCS-Lecture Notes in Computer Science 670) Hal 183-195
Author: Jonathan Bowen; Victoria Stavridou; | Call Number: 004 Woo f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
CRYPTEX model for E-commercial contract of software source code using secrete sharing scheme, (LNCS-Lecture Notes in Computer Science 5576) Hal 662-671
Author: ByungRae Cha; Youngil KIM; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Efficient software implementation of LFSR and boolean function and its application in nonlinear combiner model, (LNCS-Lecture Notes in Computer Science 2576) Hal 387-402
Author: Sandeepan Chowdhury; Subhamoy Maitra; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Combining constraint solving and symbolic model checking for a class of systems with non-linear constraints, (LNCS-Lecture Notes in Computer Science 1254) Hal 316-327
Author: William Chan; Richard Anderson; Paul Beame; David Notkin; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next