Search Result Save to File Save as CSV
Your search for 38950 returns 3854 document(s)
On the model checking problem for branching time logics and basic parallel processes, (LNCS-Lecture Notes in Computer Science 939) Hal 353-366
Author: Javier Esparza; Astrid Kiehn; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Symbolic model checking of infinite state systems using presbuger; arithmetic, (LNCS-Lecture Notes in Computer Science 1254)Hal. 400-411
Author: Tevfik Bultan; Richard Gerber and William Pugh; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Deductive multi-valued model checking, (LNCS-Lecture Notes in Computer Science 3668) Hal 297-310
Author: Ajay Mallya; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A General attack model on hash-based client puzzles, (LNCS-Lecture Notes in Computer Science 2898),Hal. 319-331
Author: Geraint Price; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Plan databases: model and algebra, (LNCS-Lecture Notes in Computer Science 2942), Hal. 302-319
Author: Fusun Yaman; Sibel adali; Dana Nau; Mria L. Supino and V.S. Subrahmanian; | Call Number: 006.33 Sei f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Encoding w: a logic z in 2obj, (LNCS-Lecture Notes in Computer Science 670) Hal 462-481
Author: Andrew Martin; | Call Number: 004 Woo f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
An overview of the SPRINT method, (LNCS-Lecture Notes in Computer Science 670) Hal 403-427
Author: H.B.M. Jonkers; | Call Number: 004 Woo f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Real-time refinement, (LNCS-Lecture Notes in Computer Science 670) Hal 314-331
Author: Colin Fidge; | Call Number: 004 Woo f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
On the security propeties and attacks againts mobile agent graph head scaling (MGHS), (LNCS-Lecture Notes in Computer Science 5576) Hal. 223-228
Author: Abid Khan; Qasim Arshad; Xiamu Niu; Zhang Yong; Muhammad Waqas Anwar; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Security evaluation of an infrusion tolerant web service architecture using stochastic activity networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 1-10Hal. 260-269
Author: Zahra Aghajani; Mohammad Abdollahi Azgomi; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next