Your search for 52398 returns 3026 document(s) |
Deductive search for errors in the free data type specifications using model generation, Hal. 211-225 |
Author: Wolfgang Ahrendt; | Call Number: SEM-281 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Object-relational database management system (ORDBMS) using frame model approach, Hal. 375-384 |
Author: H.K. Wong and Anthony S. Fong; | Call Number: SEM-259 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cloud computing model and implementation of molecular dynamics simulation using amber and gromacs, 31-36 |
Author: Ari Wibisono, Heru Suhartanto; | Call Number: SEM 304 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Symbolic model checking of infinite state systems using presburger arithmetic, (LNCS-Lecture Notes in Computer Science 1254) Hal 400-411 |
Author: Tevfik Bultan; Richard Gerber; William Pugh; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Efficient model checking using tabled resolution,(LNCS-Lecture Notes in Computer Science 1254) Hal 143-154 |
Author: Y.S. Ramakrishna; C.R. Ramakhrisnan; I.V. Ramakrishnan; Scott A. Smolka; Terrance Swift; David S. Warren; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Symbolic model checking of infinite state systems using presbuger; arithmetic, (LNCS-Lecture Notes in Computer Science 1254)Hal. 400-411 |
Author: Tevfik Bultan; Richard Gerber and William Pugh; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A type-2 fuzzy control traffic policing mechanism schemes model over high speed network using backpressure technique, 1-5 |
Author: Somchai Lekcharoen; | Call Number: SEM-349 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A network security policy framework using multi-attribute decision making model, 116-120 |
Author: Song Yu, He Xiaoli, Ye Xiaotong, Liang Jinming, He Xianbo; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Analysis of denial-of service attack resistance using a real-time model checker, 159-163 |
Author: Tatsuya ARAI, Shin-ya NISHIZAKI; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Performance evaluation of generic image classification algorithm using sparse bayesian model, 453-457 |
Author: Lei Chen, Qijun Chen; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|