Your search for 38926 returns 5216 document(s) |
An authorization model for e-consent requirement in a health care application, (LNCS-Lecture Notes in Computer Science 2576) Hal 191-205 |
Author: Chun Ruan; Vijay Varadharajan; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Implementing a hidden markov model speech recognition system in programmable logic, (LNCS-Lecture Notes in Computer Science 2147) Hal 81-90 |
Author: Stephen J. Melnikoff; Steven F.Quigley; Martin J. Russell; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
SMC: a symmetry based model checker for verification of liveness properties, (LNCS-Lecture Notes in Computer Science 1254) Hal 464-467 |
Author: A. P. Sistla; L. Miliades; V. Gyuris; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Specification and validation of a security policy model, (LNCS-Lecture Notes in Computer Science 670) Hal 42-51 |
Author: Tony Boswell; | Call Number: 004 Woo f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Automating the generation and sequencing of test cases from model-based specifications, (LNCS-Lecture Notes in Computer Science 670) Hal 268-284 |
Author: Jeremy Dick; Alain Faivre; | Call Number: 004 Woo f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A General attack model on hash-based client puzzles, (LNCS-Lecture Notes in Computer Science 2898),Hal. 319-331 |
Author: Geraint Price; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Plan databases: model and algebra, (LNCS-Lecture Notes in Computer Science 2942), Hal. 302-319 |
Author: Fusun Yaman; Sibel adali; Dana Nau; Mria L. Supino and V.S. Subrahmanian; | Call Number: 006.33 Sei f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Analysis of denial-of service attack resistance using a real-time model checker, 159-163 |
Author: Tatsuya ARAI, Shin-ya NISHIZAKI; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Selective regression test for access control systems employing RBCA,(LNCS-Lecture Notes in Computer Science 5576) Hal. 70-79 |
Author: Chao Huang; Jianling Sun; Xinyu Wang; Yuanjie Si; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Attack pattern discovery by frequent episodes mining from honeypot systems, (LNCS-Lecture Notes in Computer Science 5576) Hal. 301-316 |
Author: Ming Yang Su, Kai Chi Chang; Chun-Yuen Lin; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|