書名 | 作者 | 出版年 | 查看 | 回報錯誤連結 |
Semantic applications:methodology, technology, corporate use / |
Thomas Hoppe, Bernhard Humm, Anatol Reibold. |
2018 |
查看
|
回報問題連結 |
A polynomial translation of mobile ambients into safe petri nets:understanding a calculus of hierarchical protection domains / |
Susanne Gobel. |
2016 |
查看
|
回報問題連結 |
Complete symbolic simulation of SystemC models:efficient formal verification of finite non-terminating programs / |
Vladimir Herdt. |
2016 |
查看
|
回報問題連結 |
Syndevs co-design flow:a hardware / software co-design flow based on the discrete event system specification model of computation / |
H. Gregor Molter. |
2012 |
查看
|
回報問題連結 |
Information flow based security control beyond RBAC:How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) / |
Klaus-Peter Fischer-Hellmann. |
2012 |
查看
|
回報問題連結 |
ISSE 2012 securing electronic business processes:highlights of the Information Security Solutions Europe 2012 Conference / |
Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider. |
2012 |
查看
|
回報問題連結 |
|