合适 发表于 2025-3-28 16:22:24

http://reply.papertrans.cn/87/8603/860223/860223_41.png

echnic 发表于 2025-3-28 21:03:13

http://reply.papertrans.cn/87/8603/860223/860223_42.png

呼吸 发表于 2025-3-28 23:58:23

http://reply.papertrans.cn/87/8603/860223/860223_43.png

印第安人 发表于 2025-3-29 06:08:59

http://reply.papertrans.cn/87/8603/860223/860223_44.png

Deference 发表于 2025-3-29 07:21:22

Goal-Based Establishment of an Information Security Management System Compliant to ISO 27001companies achieved a security certification according to the ISO 27001 standard. However, assembling an Information Security Management System (ISMS) according to the ISO 27001 standard is difficult, because the standard provides only sparse support for system development and documentation..Security

狂乱 发表于 2025-3-29 13:37:36

http://reply.papertrans.cn/87/8603/860223/860223_46.png

预示 发表于 2025-3-29 15:57:39

http://reply.papertrans.cn/87/8603/860223/860223_47.png

极小量 发表于 2025-3-29 20:34:16

Towards Unlocking the Full Potential of Multileaf Collimatorsves configurations that can be shaped with the MLC to properly deliver a given treatment. In this paper, we analyse, from an algorithmic point of view, the impact of using dual-layer MLCs and Rotating Collimators for this purpose.

Inclement 发表于 2025-3-30 00:47:37

http://reply.papertrans.cn/87/8603/860223/860223_49.png

条约 发表于 2025-3-30 04:40:04

Error-Pruning in Interface Automataith a specific parallel composition: if one component receives an unexpected input, this is regarded as an error and the resp. error states are removed with a special pruning operation. In this paper, we return to the foundations of interface automata and study how refinement and parallel compositio
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: SOFSEM 2014: Theory and Practice of Computer Science; 40th International C Viliam Geffert,Bart Preneel,A Min Tjoa Conference proceedings 20