Your search for 38920 returns 3803 document(s) |
Deductive multi-valued model checking, (LNCS-Lecture Notes in Computer Science 3668) Hal 297-310 |
Author: Ajay Mallya; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A General attack model on hash-based client puzzles, (LNCS-Lecture Notes in Computer Science 2898),Hal. 319-331 |
Author: Geraint Price; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Plan databases: model and algebra, (LNCS-Lecture Notes in Computer Science 2942), Hal. 302-319 |
Author: Fusun Yaman; Sibel adali; Dana Nau; Mria L. Supino and V.S. Subrahmanian; | Call Number: 006.33 Sei f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Toupie = u-calculus + constraints, (LNCS-Lecture Notes in Computer Science 939) Hal 114-126 |
Author: Antoine Rauzy; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Selecting the wireless communication methods for establishing ubiquitous city-gas facilities in Korea, (LNCS-Lecture Notes in Computer Science 5576) Hal 823-828 |
Author: Jeong Seok Oh; Jang Sik Park; Jeong Rock Kwon; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A class of explicit two-step runge-kutta methods with enlarged stability regions for parallel computers, (LNCS-Lecture Notes in Computer Science 1557) Hal 68-77 |
Author: Helmut Podhaisky; Rudiger Weiner; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The industrial take-up of formal methods in safety-critical and other areas: a perspective, (LNCS-Lecture Notes in Computer Science 670) Hal 183-195 |
Author: Jonathan Bowen; Victoria Stavridou; | Call Number: 004 Woo f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
CRYPTEX model for E-commercial contract of software source code using secrete sharing scheme, (LNCS-Lecture Notes in Computer Science 5576) Hal 662-671 |
Author: ByungRae Cha; Youngil KIM; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Efficient software implementation of LFSR and boolean function and its application in nonlinear combiner model, (LNCS-Lecture Notes in Computer Science 2576) Hal 387-402 |
Author: Sandeepan Chowdhury; Subhamoy Maitra; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Combining constraint solving and symbolic model checking for a class of systems with non-linear constraints, (LNCS-Lecture Notes in Computer Science 1254) Hal 316-327 |
Author: William Chan; Richard Anderson; Paul Beame; David Notkin; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|