Search Result Save to File Save as CSV
Your search for 16492 returns 3539 document(s)
Model-Driven Requirements Validation for Automotive Embedded Software using UML (46-50)
Author: Kwan-Hyung Lee Pan-Gi Min Ju-Hyung Cho Dong-Jin Lim; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Consistency Requirements of Distributed Shared Memory for Dijkstra's Mutual Exclusion Algorithm (618-627)
Author: Jerzy Brzezinski Dariusz Wawrzyniak; | Call Number: SEM-287 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Usulan perbaikan aktifitas dalam requirement engineering berbasis area proses requirements management dan requirements development pada CMMI-DEV: Studi Kasus Divisi TI Perusahaan Pelayaran
Author: Rama Ashryputro; | Call Number: KA-188 (Softcopy KA-187) | Edition: 2011 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Formal analysis of an authentication protocol for UMTS (Universal Mobile Telecommunications systems) Using AVISPA
Author: Ilham W. Kurnia; L. Yohanes Stefanus; Ari Saptawijaya | Call Number: Jurnal Ilmu Komputer dan Informasi (JIKI) Vol. 1 No. 2 Juni 2008 | Type: UI-ana Indek Artikel
Find Similar |  Add To Favorites |  Detail in New Window 
Fingerprint synthesis towards constructing an enhanced authentication system using low resolution webcam, HAL. 679-688
Author: Md. Rajibul Islam; Md. Shohel Sayeed and Andrews Samraj; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Secure smartcard-based fingerprint authentication using gabor filter and fuzzy vault, Hal. 442-446
Author: Rifki Sadikin, Esa Prakasa; | Call Number: SEM-276 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Media-intependent watermarking classification and need for combining digital video and audio watermarking for media authentication, Hal. 62-67
Author: Jana Dittmann, Anirban Mukherjee; Martin Steinebach; | Call Number: SEM-259 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
An enhanced trust center based authentication in zigbee networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 471-484
Author: Kyunghwa Lee; Joohyun Lee; Bongduk Zhang, Jaeho Kim; Yongtas Shin; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
HOTP-Based user authentication scheme in home networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 672-681
Author: Binod Vaidya; Jong Hyuk Park; Joel J.P.C. Rodrigues; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Device authentication/ authorization protocol for home network in next generation security, (LNCS-Lecture Notes in Computer Science 5576) Hal 760-768
Author: Jong Sik Moon; Deok Gyu Lee; Im-Yeong Lee; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   6 7 8 9 10 11 12 13 14 15  Next