Search Result Save to File Save as CSV
Your search for 25203 returns 4752 document(s)
A Security Architecture for Mobile Agents in Ajanta (402-409)
Author: N. Karnik A. Tripathi; | Call Number: SEM-287 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A Memetic algorithm based solution to bandwith optimization in ATM networks, HAL. 886-893
Author: Susmi Routray; A.M. Sherry and B.V.R. Reddy; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Differentialy Private Optimization Algorithms for Deep Neural Networks. Hal 387-393
Author: Roan Gylbearth, Risman Adnan, Setiadi Yazid, T. Basaruddin; | Call Number: SEM-372 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A Goal-driven Approach for Combinatorial Optimization using Q'tron Neural Networks (60-65)
Author: T.-W. Yue Z.Z.Lee; | Call Number: SEM-306 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Second generation mobile and wireless networks/Uyless D. Black
Author: Black, Uyless D.; | Call Number: 621.382 Bla s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Survey of Attacks on Mobile AdhocWireless Networks (613-616)
Author: Vikas Solomon Abel; | Call Number: SEM-323 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Initiative takes long view of tele-immersion* will wireless be IPv6's killer app? , page 28
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Benchmark untuk web security, page 18
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
State of IT security 2006, page 26
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Mobile payments, page 120
Author: Upkar V. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next