Search Result
Save to File
Your search for
16492
returns
3539
document(s)
Model-Driven Requirements Validation for Automotive Embedded Software using UML (46-50)
Author: Kwan-Hyung Lee Pan-Gi Min Ju-Hyung Cho Dong-Jin Lim; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Consistency Requirements of Distributed Shared Memory for Dijkstra's Mutual Exclusion Algorithm (618-627)
Author: Jerzy Brzezinski Dariusz Wawrzyniak; | Call Number: SEM-287 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Usulan perbaikan aktifitas dalam requirement engineering berbasis area proses requirements management dan requirements development pada CMMI-DEV: Studi Kasus Divisi TI Perusahaan Pelayaran
Author: Rama Ashryputro; | Call Number: KA-188 (Softcopy KA-187) | Edition: 2011 | Type: Karya Akhir (KA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Formal analysis of an authentication protocol for UMTS (Universal Mobile Telecommunications systems) Using AVISPA
Author: Ilham W. Kurnia; L. Yohanes Stefanus; Ari Saptawijaya | Call Number: Jurnal Ilmu Komputer dan Informasi (JIKI) Vol. 1 No. 2 Juni 2008 | Type: UI-ana Indek Artikel
Find Similar
|
Add To Favorites
|
Detail in New Window
Fingerprint synthesis towards constructing an enhanced authentication system using low resolution webcam, HAL. 679-688
Author: Md. Rajibul Islam; Md. Shohel Sayeed and Andrews Samraj; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Secure smartcard-based fingerprint authentication using gabor filter and fuzzy vault, Hal. 442-446
Author: Rifki Sadikin, Esa Prakasa; | Call Number: SEM-276 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Media-intependent watermarking classification and need for combining digital video and audio watermarking for media authentication, Hal. 62-67
Author: Jana Dittmann, Anirban Mukherjee; Martin Steinebach; | Call Number: SEM-259 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
An enhanced trust center based authentication in zigbee networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 471-484
Author: Kyunghwa Lee; Joohyun Lee; Bongduk Zhang, Jaeho Kim; Yongtas Shin; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
HOTP-Based user authentication scheme in home networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 672-681
Author: Binod Vaidya; Jong Hyuk Park; Joel J.P.C. Rodrigues; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Device authentication/ authorization protocol for home network in next generation security, (LNCS-Lecture Notes in Computer Science 5576) Hal 760-768
Author: Jong Sik Moon; Deok Gyu Lee; Im-Yeong Lee; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
6
7
8
9
10
11
12
13
14
15
Next