Your search for 39690 returns 3601 document(s) |
Symbolic Model checking for distributed real-time systems,(LNCS-Lecture Notes in Computer Science 670) Hal 632-651 |
Author: Farn Wang; Aloysius Mok; E. Allen Emerson; | Call Number: 004 Woo f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Model checking in practice the T9000 virtual channel processor, (LNCS-Lecture Notes in Computer Science 670) Hal 129-147 |
Author: Geoff Barrett; | Call Number: 004 Woo f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Towards implementations for advanced equivalence checking in answer-set programming, (LNCS-Lecture Notes in Computer Science 3668) Hal 189-203 |
Author: Hans Tompits; Stefan Woltran; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Deductive multi-valued model checking, (LNCS-Lecture Notes in Computer Science 3668) Hal 297-310 |
Author: Ajay Mallya; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Using sat in qbf, (LNCS-Lecture Notes in Computer Science 3709) Hal 578-592 |
Author: Horst Samulowitz; Fahiem Bacchus; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
For net: a distributed forensics networks, (LNCS-Lecture Notes in Computer Science 2776), Hal. 1-16 |
Author: Kulesh Shammugasundaram, Nasir Memon; Anubhav Savant, and Herve Bronnimann; | Call Number: 006.33 Sei f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Utilizing symmetry when model checking under fairness assumptions: an automata-theoretic approach, (LNCS-Lecture Notes in Computer Science 939) Hal 309-324 |
Author: E. A. Emerson; A. P. Sistla; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Using OCSP to secure certificate-using transactions in m-commerce, (LNCS-Lecture Notes in Computer Science 2576) Hal 280-292 |
Author: Jose L. Munoz; Jordi Forne; Oscar Esparza; Bernabe Miguel Soriano; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Fine-grain access control using shibboleth for the storage resource broker,(LNCS-Lecture Notes in Computer Science 5576) Hal. 41-50 |
Author: Vineela Muppavarapu; Soon M. Chung; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Attention : attackER traceback using MAC layer abnormalilty detection, (LNCS-Lecture Notes in Computer Science 5576) Hal. 239-249 |
Author: Yongjin Kim; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|