Search Result Save to File Save as CSV
Your search for 38928 returns 2447 document(s)
Verification of real-time systems by successive over and under approximation, (LNCS-Lecture Notes in Computer Science 939) Hal 409-422
Author: David L. Dill; Howard Wong-Toi; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Verification of real-time systems by successive over and under approximation, (LNCS-Lecture Notes in Computer Science 939) Hal 409-422
Author: David L. Dill; Howard Wong-Toi; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Efficient timing analysis of a class of petri nets, (LNCS-Lecture Notes in Computer Science 939) Hal 423-436
Author: Henrik Hulgaard; Steven M. Burns; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Verifying w-regular properties for a subclass of linear hybrid systems, (LNCS-Lecture Notes in Computer Science 939) Hal 437-450
Author: Ahmed Bouajjani; Riadh Robbana; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Using relative refinement for fault tolerance,(LNCS-Lecture Notes in Computer Science 939) Hal 19-41
Author: Antonio Cau; Willem-Paul de Roever; | Call Number: 004 Woo f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Interactively verifying a simple real-time scheduler, (LNCS-Lecture Notes in Computer Science 939) Hal 395-408
Author: Colin Fidge; Peter Kearney; Mark Utting; | Call Number: 004 Int c | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Golden delicious games for the applie computer
Author: Franklin, Howard; | Call Number: 005.133 Fra t | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Basic computer games/edited by H. Ahl
Call Number: 794 Bas | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Open key exchange: how to defeat dictionary attacks without encrypting public keys, (LNCS-Lecture Notes in Computer Science 939) Hal 79-90
Author: Stefan Lucks; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Efficient checking of behavioural relations and modal assertions using fixed-point inversion, (LNCS-Lecture Notes in Computer Science 939) Hal 142-154
Author: Henrik Reif Andersen; Bart Vergauwen; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next