Search Result Save to File Save as CSV
Your search for 38935 returns 3509 document(s)
Verification of real-time systems by successive over and under approximation, (LNCS-Lecture Notes in Computer Science 939) Hal 409-422
Author: David L. Dill; Howard Wong-Toi; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Efficient timing analysis of a class of petri nets, (LNCS-Lecture Notes in Computer Science 939) Hal 423-436
Author: Henrik Hulgaard; Steven M. Burns; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Verifying w-regular properties for a subclass of linear hybrid systems, (LNCS-Lecture Notes in Computer Science 939) Hal 437-450
Author: Ahmed Bouajjani; Riadh Robbana; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Using relative refinement for fault tolerance,(LNCS-Lecture Notes in Computer Science 939) Hal 19-41
Author: Antonio Cau; Willem-Paul de Roever; | Call Number: 004 Woo f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Interactively verifying a simple real-time scheduler, (LNCS-Lecture Notes in Computer Science 939) Hal 395-408
Author: Colin Fidge; Peter Kearney; Mark Utting; | Call Number: 004 Int c | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Speech-driven text retrieval: using target ir collections for statistical language model adaptation in speech recognition, (LNCS-Lecture Notes in Computer Science 2773) Hal 94-104
Author: Atsushi Fujii; Katunobu Itou; Tetsuya Ishikawa; | Call Number: 006.4 Cod i | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Open key exchange: how to defeat dictionary attacks without encrypting public keys, (LNCS-Lecture Notes in Computer Science 939) Hal 79-90
Author: Stefan Lucks; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Efficient checking of behavioural relations and modal assertions using fixed-point inversion, (LNCS-Lecture Notes in Computer Science 939) Hal 142-154
Author: Henrik Reif Andersen; Bart Vergauwen; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Using formal verification/analysis methods on the critical path in system design: a case study, (LNCS-Lecture Notes in Computer Science 939) Hal 367-380
Author: Asgeir Th. Eiriksson; Ken L. McMillan; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Computer system performance modelling
Author: Sauer, Charles H.; | Call Number: 004 Sau c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   3 4 5 6 7 8 9 10 11 12  Next