Temporal constrained objects semantics application and implementation
| dc.contributor.guide | Achuthan, Krishnashree and Jayaraman, Bharat | |
| dc.coverage.spatial | Cyber Security Systems and Networks | |
| dc.creator.researcher | M, K Jinesh | |
| dc.date.accessioned | 2018-07-24T04:50:02Z | |
| dc.date.available | 2018-07-24T04:50:02Z | |
| dc.date.awarded | ||
| dc.date.completed | 2018 | |
| dc.date.registered | nd | |
| dc.description.abstract | available | |
| dc.description.note | Bibliography p. 155-168 | |
| dc.format.accompanyingmaterial | None | |
| dc.format.dimensions | - | |
| dc.format.extent | 179 p. | |
| dc.identifier.uri | http://hdl.handle.net/10603/209249 | |
| dc.language | English | |
| dc.publisher.institution | Center for Cyber Security Systems and Networks | |
| dc.publisher.place | Coimbatore | |
| dc.publisher.university | Amrita Vishwa Vidyapeetham (University) | |
| dc.relation | No. of references 98 | |
| dc.rights | university | |
| dc.source.inflibnet | INFLIBNET | |
| dc.subject.keyword | COB language | |
| dc.subject.keyword | Constraint imperative programming | |
| dc.subject.keyword | Engineering and Technology | |
| dc.subject.keyword | Templog | |
| dc.subject.keyword | Temporal constraint | |
| dc.title | Temporal constrained objects semantics application and implementation | |
| dc.title.alternative | ||
| dc.type.degree | Ph.D. |
Files
Original bundle
1 - 5 of 19
Loading...
- Name:
- 01_title.pdf
- Size:
- 115.29 KB
- Format:
- Adobe Portable Document Format
- Description:
- Attached File
Loading...
- Name:
- 05_acknowledgement.pdf
- Size:
- 54.22 KB
- Format:
- Adobe Portable Document Format
License bundle
1 - 1 of 1