Search Result Save to File Save as CSV
Your search for 13999 returns 3841 document(s)
State of IT security 2006, page 26
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Capitalize on dimensionality increasing techniques for improving face recognition grand challenge performance, page 725
Author: C. Liu | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Resilient Security for False Event detection withous Loss of Legitimate Events in Wireless Sensor Networks (454-470)
Author: Yuichi Sei Shinichi Honiden; | Call Number: SEM-376 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Security Challenges in Wireless Mesh Network Deployment and User Authentication (EAP) Method (V1-333 -- V1-337)
Author: Min Lin Shaoyong Chen; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Broadband fixed wireless travels the last mile, page 18
Author: Sixto Ortiz | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
A long-term view of short-range wireless, page 39
Author: David G. Leeper | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Location awareness in ad hoc wireless mobile networks, page 46
Author: Yu-Chee Tseng | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Profiting from value-added wireless services, page 87
Author: Andrew B.W. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Wireless beyond 3G: managing services and network resources, page 80
Author: Panagiotis D. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
End-to-end internet: IETF looks at wireless, page 80
Author: Linda W. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next