Your search for 38933 returns 4030 document(s) |
Interactively verifying a simple real-time scheduler, (LNCS-Lecture Notes in Computer Science 939) Hal 395-408 |
Author: Colin Fidge; Peter Kearney; Mark Utting; | Call Number: 004 Int c | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Multi-Valued Symbolic Model-Checking, page 371-408 |
Author: M. Chechik, [et all] | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Type-Based HFL Model Checking Algorithm (136-155) |
Author: Youkichi Hosoi
Naoki Kobayashi
Takeshi Stukada; | Call Number: SEM-374 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Speech-driven text retrieval: using target ir collections for statistical language model adaptation in speech recognition, (LNCS-Lecture Notes in Computer Science 2773) Hal 94-104 |
Author: Atsushi Fujii; Katunobu Itou; Tetsuya Ishikawa; | Call Number: 006.4 Cod i | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Model proposed for the senior management of an organization for utilizing rwources effectively to adopt web services, HAL. 721-727 |
Author: Netra Patil, Chandrani Singh and Anangha Vaidya; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
when should a process be art, not science?, page 58 |
Author: Joseph M. Hall and M. Eric Johnson | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Hybrid approach to automatic checking and correction of chinese text, Hal. 17-22 |
Author: Fuji Ren; Zhensheng Luo; | Call Number: SEM-275 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Open key exchange: how to defeat dictionary attacks without encrypting public keys, (LNCS-Lecture Notes in Computer Science 939) Hal 79-90 |
Author: Stefan Lucks; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Using formal verification/analysis methods on the critical path in system design: a case study, (LNCS-Lecture Notes in Computer Science 939) Hal 367-380 |
Author: Asgeir Th. Eiriksson; Ken L. McMillan; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Index structures for selective dissemination of information under the boolean model, page 332 |
Author: Yan, Tak W. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|