Find information:
[6-27]RT: A Role-based Trust-management Framework 2008-05-26
[6-26]How to make Discretionary Access Control ... 2008-05-26
[5-4]Rule-based modeling of cellular signalling 2008-05-03
[4-30]Artifacts+Semantics=Goal-based Workflow... 2008-04-29
[4-22]Verification of Higher-Order Computation 2008-04-17
[4-21]Efficient Query Answering over Ontologies 2008-04-14
[3-28]Formal Model Driven Design 2008-03-24
[3-28]Tool supported real-time system verification 2008-03-24
[2-26]Verifiers are Programs 2008-02-25
[1-28]Verifying Digital Circuits using Continu... 2008-01-27
[1-4]Eiffel: Programs that test themselves 2008-01-02
[12-11]Seminar on verification in type theory 2007-12-27
[12-10]Testing Concurrent Java Components 2007-12-27
[12-10]Programming with Transactional Memory 2007-12-27
[11-2]Computational self-assembly 2007-12-27
  26 Page(s)   FirstPrev2122232425NextFinal