Refine your search
Availability
-
Authors
-
Item types
-
Locations
-
Series
-
Topics
- 6GCIoHE theoretical framework
- 6GIIoE applications
- 6GIIoE challenges
- 6GIIoE priorities
- 6GIIoE theoretical framework
- Algorithms & data structures
- Approximate reanalysis
- Computer networking & communications
- Computer science
- Formal methods and theory of security
- Machine learning
- Modeling and simulation
- Semantics and reasoning
- Software Engineering
- Symbolic and algebraic manipulation
- embedded systems
- software and hardware verification
- specification and verification techniques
- static and dynamic program analysis
- system construction and transformation techniques
- Show more
- Show less
-
Collections
-
Holding libraries
-
Languages