Search Result Save to File Save as CSV
Your search for 54060 returns 858 document(s)
Module checking revisited, (LNCS-Lecture Notes in Computer Science 1254) Hal 36-47
Author: Orna Kupferman; Moshe Y. Vardi; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Using SPIN model checking for transmission control protocol, 33-37
Author: Nan Jiang, Zhiqiang Chen; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Effient model checking of network authentication protocol based on SPIN, 100-104
Author: Zhi-hua Tan, Da-fang Zang, Li MIAO, Dan Zhao; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Inmplementasi mekanisme fraud checking setelah pembayaran terverifikasi pada aplikasi tokopedia
Author: Zulia Putri Rahmadhani; | Call Number: KP-3165 | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Graph-based Study on Consistency Checking for Point Objects (V1-444 -- V1-446)
Author: Liu Zheng-lin Gao Ai-Hua Zhao Yong-Gang Guan Jian Wei Rui; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Extending systematic local search for job shop scheduling problems, (LNCS-Lecture Notes in Computer Science 3709) Hal 762-766
Author: Bistra Dilkina; Lei Duan; William S. Havens; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Extending the Understanding of End User Information Systems Satisfaction Formation: An Equitable Needs Fulfillment Model Approach Page 43-66
Author: N. Au, E. W. T. Ngai, and T. C. E. Cheng | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Extending a functional DBPL with ECA-rules (LNCS-Lecture Notes in Computer Science 985) Hal. 101-115
Author: Swarup Reddi, Alex Poulovassilis, Carol Small; | Call Number: 004 Rul | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
On the correctness of scurity proofs for the 3GPP confidentiality and integrity algorithms, LNCS-Lecture Notes in Computer Science 2898), Hal. 206-318
Author: Testsu Iwata and Kaoru Kurosawa; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Managing corporate reputation and risk: developing a strategic approach to corporate integrity using knowledge management/ Dale Neef
Author: Neef Dale; | Call Number: 659.2 Nee m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   10 11 12 13 14 15 16 17 18 19  Next