Search Result Save to File Save as CSV
Your search for 38933 returns 4030 document(s)
Interactively verifying a simple real-time scheduler, (LNCS-Lecture Notes in Computer Science 939) Hal 395-408
Author: Colin Fidge; Peter Kearney; Mark Utting; | Call Number: 004 Int c | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Multi-Valued Symbolic Model-Checking, page 371-408
Author: M. Chechik, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
A Type-Based HFL Model Checking Algorithm (136-155)
Author: Youkichi Hosoi Naoki Kobayashi Takeshi Stukada; | Call Number: SEM-374 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Speech-driven text retrieval: using target ir collections for statistical language model adaptation in speech recognition, (LNCS-Lecture Notes in Computer Science 2773) Hal 94-104
Author: Atsushi Fujii; Katunobu Itou; Tetsuya Ishikawa; | Call Number: 006.4 Cod i | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Model proposed for the senior management of an organization for utilizing rwources effectively to adopt web services, HAL. 721-727
Author: Netra Patil, Chandrani Singh and Anangha Vaidya; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
when should a process be art, not science?, page 58
Author: Joseph M. Hall and M. Eric Johnson | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
A Hybrid approach to automatic checking and correction of chinese text, Hal. 17-22
Author: Fuji Ren; Zhensheng Luo; | Call Number: SEM-275 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Open key exchange: how to defeat dictionary attacks without encrypting public keys, (LNCS-Lecture Notes in Computer Science 939) Hal 79-90
Author: Stefan Lucks; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Using formal verification/analysis methods on the critical path in system design: a case study, (LNCS-Lecture Notes in Computer Science 939) Hal 367-380
Author: Asgeir Th. Eiriksson; Ken L. McMillan; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Index structures for selective dissemination of information under the boolean model, page 332
Author: Yan, Tak W. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   6 7 8 9 10 11 12 13 14 15  Next