Search Results - Basin, David
- Results 1 – 20 of 20
-
1The Complete Guide to SCION: From Design Principles to Formal VerificationPublished 2022Call Number: Loading…Fulltext
Located: Loading…Electronic eBook Loading… -
2Applied information security: a hands-on approachPublished 2011Call Number: Loading…Table of Contents EBook available at UBR You can use this EBook on site at the UBR.
Located: Loading…Electronic eBook Loading… -
3Search in games with incomplete information: a case study using bridge card playPublished 1996Call Number: Loading…
Located: Loading…Book Loading… -
4Middle-out reasoning for synthesis and inductionPublished 1995Call Number: Loading…
Located: Loading…Book Loading… -
5Workshop on Theorem Proving with Analytic Tableaux and Related Methods: Marseille, France, April 28 - 30, 1993Published 1993Call Number: Loading…Table of Contents
Located: Loading…Conference Proceeding Book Loading… -
6An adaptation of proof-planning to declarer play in bridgePublished 1992Call Number: Loading…
Located: Loading…Book Loading… -
7The Boyer-Moore prover and NUPRL: an experimental comparisonPublished 1991Call Number: Loading…
Located: Loading…Book Loading… -
8Some normalization properties of Martin-Löf's type theory, and applicationsPublished 1991Call Number: Loading…
Located: Loading…Book Loading… -
9Difference matchingPublished 1991Call Number: Loading…
Located: Loading…Book Loading… -
10Applied information security: a hands-on approachPublished 2011Call Number: Loading…Table of Contents
Located: Loading…Book Loading… -
11Proceedings of the second ACM conference on Wireless network securityPublished 2009Call Number: Loading…
Located: Loading…Electronic eBook Loading… -
12Engineering theories of software intensive systems: International Summer School Marktoberdorf August 3 to August 15, 2004; working material for the lectures[3] - Model driven security : from UML models to access control infrastructuresPublished 2004Call Number: Loading…
Located: Loading…Conference Proceeding Book Loading… -
13Labelled DeductionPublished 2000Call Number: Loading…
Located: Loading…Electronic eBook Loading… -
14Automating meta-theory creation and system extensionPublished 1991Call Number: Loading…
Located: Loading…Book Loading… -
15Middle-out reasoning for logic program synthesisPublished 1993Call Number: Loading…
Located: Loading…Book Loading… -
16Metalogical frameworksPublished 1992Call Number: Loading…
Located: Loading…Book Loading… -
17Logic program synthesis via proof planningPublished 1992Call Number: Loading…
Located: Loading…Book Loading… -
18Extracting circuits from constructive proofsPublished 1991Call Number: Loading…
Located: Loading…Book Loading… -
19Experience with FS0 as a framework theoryPublished 1991Call Number: Loading…
Located: Loading…Book Loading… -
20Metalogical frameworksPublished 1991Call Number: Loading…
Located: Loading…Book Loading…