Search Result Save to File Save as CSV
Your search for 39690 returns 3601 document(s)
Symbolic Model checking for distributed real-time systems,(LNCS-Lecture Notes in Computer Science 670) Hal 632-651
Author: Farn Wang; Aloysius Mok; E. Allen Emerson; | Call Number: 004 Woo f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Model checking in practice the T9000 virtual channel processor, (LNCS-Lecture Notes in Computer Science 670) Hal 129-147
Author: Geoff Barrett; | Call Number: 004 Woo f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Towards implementations for advanced equivalence checking in answer-set programming, (LNCS-Lecture Notes in Computer Science 3668) Hal 189-203
Author: Hans Tompits; Stefan Woltran; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Deductive multi-valued model checking, (LNCS-Lecture Notes in Computer Science 3668) Hal 297-310
Author: Ajay Mallya; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Using sat in qbf, (LNCS-Lecture Notes in Computer Science 3709) Hal 578-592
Author: Horst Samulowitz; Fahiem Bacchus; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
For net: a distributed forensics networks, (LNCS-Lecture Notes in Computer Science 2776), Hal. 1-16
Author: Kulesh Shammugasundaram, Nasir Memon; Anubhav Savant, and Herve Bronnimann; | Call Number: 006.33 Sei f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Utilizing symmetry when model checking under fairness assumptions: an automata-theoretic approach, (LNCS-Lecture Notes in Computer Science 939) Hal 309-324
Author: E. A. Emerson; A. P. Sistla; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Using OCSP to secure certificate-using transactions in m-commerce, (LNCS-Lecture Notes in Computer Science 2576) Hal 280-292
Author: Jose L. Munoz; Jordi Forne; Oscar Esparza; Bernabe Miguel Soriano; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Fine-grain access control using shibboleth for the storage resource broker,(LNCS-Lecture Notes in Computer Science 5576) Hal. 41-50
Author: Vineela Muppavarapu; Soon M. Chung; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Attention : attackER traceback using MAC layer abnormalilty detection, (LNCS-Lecture Notes in Computer Science 5576) Hal. 239-249
Author: Yongjin Kim; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next