Search Result Save to File Save as CSV
Your search for 38921 returns 3729 document(s)
Using design-level scan to improve FPGA design observability and controllability for functional verification, (LNCS-Lecture Notes in Computer Science 2147) Hal 483-492
Author: Timothy Wheeler; Paul Graham; Brent Nelson; Brad Hutchings; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Scaling up uppaal automatic verification of real-time systems using compositionality and abstraction, (LNCS-Lecture Notes in Computer Science 1926) Hal 19-30
Author: Henrik Ejersbo Jensen; Kim Guldstrand Larsen; Arne Skou; | Call Number: 004.33 Jos f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Fast recursive computation of local axial moments by using primitive kernel functions, (LNCS-Lecture Notes in Computer Science 1557) Hal 596-597
Author: Roman M. Palenichka; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Using an object-oriented methodology to bring a hybrid system from initial concept to formal definition, (LNCS-Lecture Notes in Computer Science 1201) Hal 186-198
Author: David Sinclair; | Call Number: 004.33 Mal h | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Planning complex updates to satisfy constraint rules using a constraint logic search engine (LNCS-Lecture Notes in Computer Science 985)
Author: Suzanne M. Embury, Peter M.D. Gray; | Call Number: 004 Rul | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Vector-based semantic analysis using random indexing for cross-lingual query expansion, (LNCS-Lecture Notes in Computer Science, 2406), 169-170
Author: Magnus Sahigren; Jussi Karigren; | Call Number: 025.04 Eva | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
More detail for combined timing and power attack againt implementation of RSA, Efficient key updating signaturn schemes based on IBS, LNCS-Lecture Notes in Computer Science 2898) Hal. 245-263
Author: Werner Schinler and Colin D. Walter; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
An efficient method for checking object-oriented database schema correctness
Author: A. Formica | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Face spoofing detection using inception-v3 on RGB modal and depth modal
Author: Yuni Arti; aniati murni arymurthy; | Call Number: Mak T Jilid 121-139 (T-1332) (Mak T-130) | Type: Makalah Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
CAVEAT: technique and tool for computer aided verification and transformation, (LNCS-Lecture Notes in Computer Science 939) Hal 70-83
Author: E. Pascal Gribomont; Didier Rossetto; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   8 9 10 11 12 13 14 15 16 17  Next