Your search returned 1706 results.

Not what you expected? Check for suggestions
541.
Cooperative Information Agents III

by Matthias Klusch, Onn M. Shehory, Gerhard Weiß.

Series: Lecture Notes in Computer ScienceEdition: 1999Material type: Computer file Computer file; Format: electronic Publication details: Springer Berlin Heidelberg 1999Online access: Click here to access online Availability: Items available for reference: Accessible Online (1). : Location(s): .

542.
Coordinating Plans of Autonomous Agents

by Frank v. Martial.

Series: Lecture Notes in Computer ScienceEdition: 1992Material type: Computer file Computer file; Format: electronic Publication details: Springer Berlin Heidelberg 1992Online access: Click here to access online Availability: Items available for reference: Accessible Online (1). : Location(s): .

543.
Coordination Languages and Models

by Paolo Ciancarini, Chris Hankin.

Series: Lecture Notes in Computer ScienceEdition: 1996Material type: Computer file Computer file; Format: electronic Publication details: Springer Berlin Heidelberg 1996Online access: Click here to access online Availability: Items available for reference: Accessible Online (1). : Location(s): .

544.
Coordination Languages and Models

by David Garlan, Daniel Le Metayer.

Series: Lecture Notes in Computer ScienceEdition: 1997Material type: Computer file Computer file; Format: electronic Publication details: Springer Berlin Heidelberg 1997Online access: Click here to access online Availability: Items available for reference: Accessible Online (1). : Location(s): .

545.
Coordination Languages and Models

by Paolo Ciancarini, Alexander L. Wolf.

Series: Lecture Notes in Computer ScienceEdition: 1999Material type: Computer file Computer file; Format: electronic Publication details: Springer Berlin Heidelberg 1999Online access: Click here to access online Availability: Items available for reference: Accessible Online (1). : Location(s): .

546.
Coordination Technology for Collaborative Applications

by Wolfram Conen, Gustaf Neumann.

Series: Lecture Notes in Computer ScienceEdition: 1998Material type: Computer file Computer file; Format: electronic Publication details: Springer Berlin Heidelberg 1998Online access: Click here to access online Availability: Items available for reference: Accessible Online (1). : Location(s): .

547.
Coroutines

by C.D. Marlin.

Series: Lecture Notes in Computer ScienceEdition: 1980Material type: Computer file Computer file; Format: electronic Publication details: Springer Berlin Heidelberg 1980Online access: Click here to access online Availability: Items available for reference: Accessible Online (1). : Location(s): .

548.
Correct Hardware Design and Verification Methods

by Laurence Pierre, Thomas Kropf.

Series: Lecture Notes in Computer ScienceEdition: 1999Material type: Computer file Computer file; Format: electronic Publication details: Springer Berlin Heidelberg 1999Online access: Click here to access online Availability: Items available for reference: Accessible Online (1). : Location(s): .

549.
Correct Hardware Design and Verification Methods

by George J. Milne, Laurence Pierre.

Series: Lecture Notes in Computer ScienceEdition: 1993Material type: Computer file Computer file; Format: electronic Publication details: Springer Berlin Heidelberg 1993Online access: Click here to access online Availability: Items available for reference: Accessible Online (1). : Location(s): .

550.
Correct Hardware Design and Verification Methods

by Paolo Enrico Camurati, Hans Eveking.

Series: Lecture Notes in Computer ScienceEdition: 1995Material type: Computer file Computer file; Format: electronic Publication details: Springer Berlin Heidelberg 1995Online access: Click here to access online Availability: Items available for reference: Accessible Online (1). : Location(s): .

551.
Correct System Design

by Ernst-Rüdiger Olderog, Bernhard Steffen.

Series: Lecture Notes in Computer ScienceEdition: 1999Material type: Computer file Computer file; Format: electronic Publication details: Springer Berlin Heidelberg 1999Online access: Click here to access online Availability: Items available for reference: Accessible Online (1). : Location(s): .

552.
The Cray X-MP/Model 24

by Kay A. Robbins, Steven Robbins.

Series: Lecture Notes in Computer ScienceEdition: 1st ed. 1989Material type: Computer file Computer file; Format: electronic Publication details: Springer New York 1989Online access: Click here to access online Availability: Items available for reference: Accessible Online (1). : Location(s): .

553.
Creating Personalities for Synthetic Actors

by Robert Trappl, Paolo Petta.

Series: Lecture Notes in Computer ScienceEdition: 1997Material type: Computer file Computer file; Format: electronic Publication details: Springer Berlin Heidelberg 1997Online access: Click here to access online Availability: Items available for reference: Accessible Online (1). : Location(s): .

554.
Cryptographic Hardware and Embedded Systems

by Cetin K. Koc, Christof Paar.

Series: Lecture Notes in Computer ScienceEdition: 1999Material type: Computer file Computer file; Format: electronic Publication details: Springer Berlin Heidelberg 1999Online access: Click here to access online Availability: Items available for reference: Accessible Online (1). : Location(s): .

555.
Cryptography

by T. Beth.

Series: Lecture Notes in Computer ScienceEdition: 1983Material type: Computer file Computer file; Format: electronic Publication details: Springer Berlin Heidelberg 1983Online access: Click here to access online Availability: Items available for reference: Accessible Online (1). : Location(s): .

556.
Cryptography and Coding

by Michael Walker.

Series: Lecture Notes in Computer ScienceEdition: 1999Material type: Computer file Computer file; Format: electronic Publication details: Springer Berlin Heidelberg 1999Online access: Click here to access online Availability: Items available for reference: Accessible Online (1). : Location(s): .

557.
Cryptography and Coding

by Michael Darnell.

Series: Lecture Notes in Computer ScienceEdition: 1997Material type: Computer file Computer file; Format: electronic Publication details: Springer Berlin Heidelberg 1997Online access: Click here to access online Availability: Items available for reference: Accessible Online (1). : Location(s): .

558.
Cryptography and Coding

by Colin Boyd.

Series: Lecture Notes in Computer ScienceEdition: 1995Material type: Computer file Computer file; Format: electronic Publication details: Springer Berlin Heidelberg 1995Online access: Click here to access online Availability: Items available for reference: Accessible Online (1). : Location(s): .

559.
Cryptography: Policy and Algorithms

by Edward Pyle Dawson, Jovan Golic.

Series: Lecture Notes in Computer ScienceEdition: 1996Material type: Computer file Computer file; Format: electronic Publication details: Springer Berlin Heidelberg 1996Online access: Click here to access online Availability: Items available for reference: Accessible Online (1). : Location(s): .

560.
CSL '87

by Egon Börger, Hans Kleine Büning, Michael M. Richter.

Series: Lecture Notes in Computer ScienceEdition: 1988Material type: Computer file Computer file; Format: electronic Publication details: Springer Berlin Heidelberg 1988Online access: Click here to access online Availability: Items available for reference: Accessible Online (1). : Location(s): .