Your search for 47994 returns 198 document(s) |
E-process design and assurance using model checking, page 48 |
Author: Wenli Wang | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An efficient method for checking object-oriented database schema correctness |
Author: A. Formica | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Hybrid approach to automatic checking and correction of chinese text, Hal. 17-22 |
Author: Fuji Ren; Zhensheng Luo; | Call Number: SEM-275 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Lazy theorem proving for bounded model checking over infinite domains, Hal. 438-455 |
Author: Leonardo de Moura, Harald Rueb, Maria Sorea; | Call Number: SEM-281 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Module checking revisited, (LNCS-Lecture Notes in Computer Science 1254) Hal 36-47 |
Author: Orna Kupferman; Moshe Y. Vardi; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Using SPIN model checking for transmission control protocol, 33-37 |
Author: Nan Jiang, Zhiqiang Chen; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Effient model checking of network authentication protocol based on SPIN, 100-104 |
Author: Zhi-hua Tan, Da-fang Zang, Li MIAO, Dan Zhao; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Inmplementasi mekanisme fraud checking setelah pembayaran terverifikasi pada aplikasi tokopedia |
Author: Zulia Putri Rahmadhani; | Call Number: KP-3165 | Type: Kerja Praktek (KP)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Graph-based Study on Consistency Checking for Point Objects (V1-444 -- V1-446) |
Author: Liu Zheng-lin
Gao Ai-Hua
Zhao Yong-Gang
Guan Jian
Wei Rui; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On the correctness of scurity proofs for the 3GPP confidentiality and integrity algorithms, LNCS-Lecture Notes in Computer Science 2898), Hal. 206-318 |
Author: Testsu Iwata and Kaoru Kurosawa; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|