Search Results - Basin, David
- Showing 1 – 20 results of 20
-
1Search in games with incomplete information: a case study using bridge card playPublished 1996Call Number: Loading…
Located: Loading…Book Loading… -
2Middle-out reasoning for synthesis and inductionPublished 1995Call Number: Loading…
Located: Loading…Book Loading… -
3An adaptation of proof-planning to declarer play in bridgePublished 1992Call Number: Loading…
Located: Loading…Book Loading… -
4The Boyer-Moore prover and NUPRL: an experimental comparisonPublished 1991Call Number: Loading…
Located: Loading…Book Loading… -
5Some normalization properties of Martin-Löf's type theory, and applicationsPublished 1991Call Number: Loading…
Located: Loading…Book Loading… -
6Difference matchingPublished 1991Call Number: Loading…
Located: Loading…Book Loading… -
7Engineering theories of software intensive systems: International Summer School Marktoberdorf August 3 to August 15, 2004; working material for the lectures[3] - Model driven security : from UML models to access control infrastructuresPublished 2004Call Number: Loading…
Located: Loading…Conference Proceedings Book Loading… -
8Labelled DeductionPublished 2000Call Number: Loading…Read online
Located: Loading…Electronic eBook Loading… -
9Automating meta-theory creation and system extensionPublished 1991Call Number: Loading…
Located: Loading…Book Loading… -
10Middle-out reasoning for logic program synthesisPublished 1993Call Number: Loading…
Located: Loading…Book Loading… -
11Logic program synthesis via proof planningPublished 1992Call Number: Loading…
Located: Loading…Book Loading… -
12Extracting circuits from constructive proofsPublished 1991Call Number: Loading…
Located: Loading…Book Loading… -
13Experience with FS0 as a framework theoryPublished 1991Call Number: Loading…
Located: Loading…Book Loading… -
14Metalogical frameworksPublished 1991Call Number: Loading…
Located: Loading…Book Loading… -
15The Complete Guide to SCION: From Design Principles to Formal VerificationPublished 2022Call Number: Loading…Read online (LMU) Available at the library of LMU. Read online (HM) Available at the library of Hochschule Munich University of Applied Sciences (HM).
Located: Loading…Electronic eBook Loading… -
16Proceedings of the second ACM conference on Wireless network securityPublished 2009Call Number: Loading…Read online (LMU) Available at the library of LMU.
Located: Loading…Electronic eBook Loading… -
17Applied information security: a hands-on approachPublished 2011Call Number: Loading…Table of Contents Read online (LMU) Available at the library of LMU. Read online (HM) Available at the library of Hochschule Munich University of Applied Sciences (HM).
Located: Loading…Electronic eBook Loading… -
18Workshop on Theorem Proving with Analytic Tableaux and Related Methods: Marseille, France, April 28 - 30, 1993Published 1993Call Number: Loading…Table of Contents
Located: Loading…Conference Proceedings Book Loading… -
19Applied information security: a hands-on approachPublished 2011Call Number: Loading…Table of Contents
Located: Loading…Book Loading… -
20Metalogical frameworksPublished 1992Call Number: Loading…
Located: Loading…
Book Loading…