Find information:
[12-10]Software Debugging through Dynamic Analysis of Program Structures 2009-12-09
[12-5]The 1st ISCAS-UQ Joint Workshop 2009-12-03
[12-3]A Formal Model of Ontology for Handling Fuzzy Membership and Typicality of Instances 2009-12-01
[11-30]On-the-Fly Model Checking of Security Protocols 2009-11-19
[11-27]Logic, Graphs and Parameterized Complexity 2009-11-19
[11-17]Three years of research at the MSR-INRIA Joint Centre 2009-11-13
[11-16]Model-based tool-chain for the design and analysis of embedded hybrid systems 2009-11-13
[10-29]Using Software Changes to Understand Software Projects 2009-10-28
[10-27]Component-based Construction of Heterogeneous Real-time Systems in BIP 2009-10-20
[10-16]Model Checking: My 28-year Quest to Overcome the State Explosion Problem 2009-10-12
[10-15]Unifying Theories of Data Flow 2009-10-09
[9-23]Mobility in Ad Hoc Wireless Networks: Friend or Foe 2009-09-22
[9-10]Formal security proofs for cryptographic algorithms and their implementations 2009-09-07
[9-1]Certification of code-based cryptographic proofs 2009-08-27
[8-14]RELATIVE INFORMATION COMPLETENESS 2009-08-11
  30 Page(s)   FirstPrev2122232425NextFinal