Search Result Save to File Save as CSV
Your search for 38938 returns 3685 document(s)
Verification of real-time systems by successive over and under approximation, (LNCS-Lecture Notes in Computer Science 939) Hal 409-422
Author: David L. Dill; Howard Wong-Toi; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Verification of real-time systems by successive over and under approximation, (LNCS-Lecture Notes in Computer Science 939) Hal 409-422
Author: David L. Dill; Howard Wong-Toi; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Verifying w-regular properties for a subclass of linear hybrid systems, (LNCS-Lecture Notes in Computer Science 939) Hal 437-450
Author: Ahmed Bouajjani; Riadh Robbana; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Using relative refinement for fault tolerance,(LNCS-Lecture Notes in Computer Science 939) Hal 19-41
Author: Antonio Cau; Willem-Paul de Roever; | Call Number: 004 Woo f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Interactively verifying a simple real-time scheduler, (LNCS-Lecture Notes in Computer Science 939) Hal 395-408
Author: Colin Fidge; Peter Kearney; Mark Utting; | Call Number: 004 Int c | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security risk analysis and control a guide for the dp manager
Author: Wong, KK; | Call Number: 658.47 Won r | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Symbolic analysis for automated design of analog integrated cirtuits
Author: Geielen, George; | Call Number: 621.381 Gie s | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Open key exchange: how to defeat dictionary attacks without encrypting public keys, (LNCS-Lecture Notes in Computer Science 939) Hal 79-90
Author: Stefan Lucks; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Efficient checking of behavioural relations and modal assertions using fixed-point inversion, (LNCS-Lecture Notes in Computer Science 939) Hal 142-154
Author: Henrik Reif Andersen; Bart Vergauwen; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Utilizing symmetry when model checking under fairness assumptions: an automata-theoretic approach, (LNCS-Lecture Notes in Computer Science 939) Hal 309-324
Author: E. A. Emerson; A. P. Sistla; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   6 7 8 9 10 11 12 13 14 15  Next