Filter your results
- 3
- 3
- 3
- 3
- 3
- 1
- 1
- 1
- 7
- 6
- 6
- 6
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
3 results
|
|
sorted by
|
|
Computational Completeness of Networks of Evolutionary Processors with Elementary Polarizations and a Small Number of Processors19th International Conference on Descriptional Complexity of Formal Systems (DCFS), Jul 2017, Milano, Italy. pp.140-151, ⟨10.1007/978-3-319-60252-3_11⟩
Conference papers
hal-01657015v1
|
||
|
Constraint-Based Oracles for Timed Distributed Systems29th IFIP International Conference on Testing Software and Systems (ICTSS), Oct 2017, St. Petersburg, Russia. pp.276-292, ⟨10.1007/978-3-319-67549-7_17⟩
Conference papers
hal-01678964v1
|
||
|
Anti-Forensic Threat Modeling13th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2017, Orlando, FL, United States. pp.169-183, ⟨10.1007/978-3-319-67208-3_10⟩
Conference papers
hal-01716404v1
|