Your search for 38938 returns 3739 document(s) |
Automated analysis of an audio control protocol, (LNCS-Lecture Notes in Computer Science 939) Hal 381-394 |
Author: Pei-Hsin Ho; Howard Wong-Toi; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
PS-LTL for constraint-based security protocol analysis, (LNCS-Lecture Notes in Computer Science 3668) Hal 439-440 |
Author: Ricardo Corin; Ari Saptawijaya; Sandro Etalle; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An integration of model checking with automated proof checking, (LNCS-Lecture Notes in Computer Science 939) Hal 84-97 |
Author: S. Rajan; N. Shankar; M. K. Srivas; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Supervisory control of finite state machines, (LNCS-Lecture Notes in Computer Science 939) Hal 279-292 |
Author: A. Aziz; F. Balarin; R. K. Brayton; M. D. DiBenedetto; A. Saldanha; A. L. Sangiovanni-Vincentelli; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Algorithmic analysis of nonlinear hybrid systems, (LNCS-Lecture Notes in Computer Science 939) Hal 225-238 |
Author: Thomas A. Henzinger; Pei Hsin Ho; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Efficient timing analysis of a class of petri nets, (LNCS-Lecture Notes in Computer Science 939) Hal 423-436 |
Author: Henrik Hulgaard; Steven M. Burns; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Using formal verification/analysis methods on the critical path in system design: a case study, (LNCS-Lecture Notes in Computer Science 939) Hal 367-380 |
Author: Asgeir Th. Eiriksson; Ken L. McMillan; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Protocol interactions and the chosen protocol attack, LNCS-Lecture Notes in Computer Science 1361) Hal 91-104 |
Author: John Kelsey; Bruce Schneier; David Wagner; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Interval analysis in scheduling, (LNCS-Lecture Notes in Computer Science 3709) Hal 226-240 |
Author: Jerome Fortin; Pawel Zielinski; Didier Dubois; Helene Fargier; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Analysis of rmac, (LNCS-Lecture Notes in Computer Science 2887) Hal 182-191 |
Author: Lars R. Knudsen; Tadayoshi Kohno; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|