Your search for 54060 returns 858 document(s) |
Module checking revisited, (LNCS-Lecture Notes in Computer Science 1254) Hal 36-47 |
Author: Orna Kupferman; Moshe Y. Vardi; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Using SPIN model checking for transmission control protocol, 33-37 |
Author: Nan Jiang, Zhiqiang Chen; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Effient model checking of network authentication protocol based on SPIN, 100-104 |
Author: Zhi-hua Tan, Da-fang Zang, Li MIAO, Dan Zhao; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Inmplementasi mekanisme fraud checking setelah pembayaran terverifikasi pada aplikasi tokopedia |
Author: Zulia Putri Rahmadhani; | Call Number: KP-3165 | Type: Kerja Praktek (KP)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Graph-based Study on Consistency Checking for Point Objects (V1-444 -- V1-446) |
Author: Liu Zheng-lin
Gao Ai-Hua
Zhao Yong-Gang
Guan Jian
Wei Rui; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Extending systematic local search for job shop scheduling problems, (LNCS-Lecture Notes in Computer Science 3709) Hal 762-766 |
Author: Bistra Dilkina; Lei Duan; William S. Havens; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Extending the Understanding of End User Information Systems Satisfaction Formation: An Equitable Needs Fulfillment Model Approach Page 43-66 |
Author: N. Au, E. W. T. Ngai, and T. C. E. Cheng | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Extending a functional DBPL with ECA-rules (LNCS-Lecture Notes in Computer Science 985) Hal. 101-115 |
Author: Swarup Reddi, Alex Poulovassilis, Carol Small; | Call Number: 004 Rul | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On the correctness of scurity proofs for the 3GPP confidentiality and integrity algorithms, LNCS-Lecture Notes in Computer Science 2898), Hal. 206-318 |
Author: Testsu Iwata and Kaoru Kurosawa; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Managing corporate reputation and risk: developing a strategic approach to corporate integrity using knowledge management/ Dale Neef |
Author: Neef Dale; | Call Number: 659.2 Nee m | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|