Your search for 12462 returns 3986 document(s) |
A mathematical approach towards trust based security in pervasive computing environment, (LNCS-Lecture Notes in Computer Science 5576) Hal 702-711 |
Author: Naima Iltaf; Mukhtar Hussain; Farrukh Kamran; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Hardware-software partitioning: a reconfigurable and evolutionary computing approach, (LNCS-Lecture Notes in Computer Science 2147) Hal 595-600 |
Author: Jim Harkin; Thomas M. McGinnity; Liam P. Maguire; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An approach to real-time visualization of PIV method with FPGA, and applications and applications (LNCS-Lecture Notes in Computer Science 2147) Hal 601-606 |
Author: Tsutomu maruyama; Yoshiki Yamaguchi; Atsushi Kawase; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A reconfigurable approach to packet filtering,(LNCS-Lecture Notes in Computer Science 2147) Hal 638-642 |
Author: Raymond Sinnappan; Scott Hazelhurst; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The split-proxy approach: a new architecture for parallel video servers, (LNCS-Lecture Notes in Computer Science 1557) Hal 327-336 |
Author: Giuseppe De Pietro; Marco Lerro; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Trace table based approach for pipelined microprocessor verification, (LNCS-Lecture Notes in Computer Science 1254) Hal 364-375 |
Author: Jun Sawada; Warren A. Hunt Jr; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The verus tool: a quantitative approach to the formal verification of real-time systems, (LNCS-Lecture Notes in Computer Science 1254) Hal 452-455 |
Author: Sergio Campos; Edmund Clarke; Marius Minea; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Trace table based approach for pipelined microprocessor verfication, (LNCS-Lecture Notes in Computer Science 1254), Hal. 364-375 |
Author: Jun Sawada and Warren A. Hunt Jr.; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A New approach to malware detection, (LNCS-Lecture Notes in Computer Science 5576) Hal. 229-238 |
Author: Hongying Tang; Bo Zhu; Kui Ren; | Call Number: 005.3 Adv | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The Architecture of computer hardware systems software & networking: an information technology approach 4th ed. |
Author: Englander, Irv; | Call Number: 004.22 Eng a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|