Search Result Save to File Save as CSV
Your search for 25203 returns 4752 document(s)
A Novel Network Interface of NoC with Pipeline Enhancement (V1-119 -- V1-122)
Author: Li Li Jiawen Wang yuang Zhang Hongbing Pan Rong Zhang; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Feature Enhancement for Model Selection in Time Series Forecasting (367-374)
Author: Agus Widodo Indra Budi; | Call Number: SEM-319 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Performance Enhancement Through Replication in an Object-Oriented DBMS (325-336)
Author: Eugene J. Shekita Michael J. Carey; | Call Number: SEM-228 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Objective Criteria for Typewritten Old Document Image Enhancement & Restoration (107-112)
Author: Hilda Deborah Ruli Manurung Aniati Murni Arymurthy; | Call Number: SEM-297 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
SF-STEP: securing tunnel endopoint using separate filtering IPv4 and IPv6, HAL. 283 - 289
Author: Abidah M. Taib; Rahmat Budiarto; | Call Number: SEM-294 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Performance Improvement of IPv6 Packet Transmission through Address Resolution Using Direct Mapping
Author: Raja Kumar Murugesan,Rahmat Budiarto,Serswaran Ramadass; | Call Number: SEM-305 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A data mining framework for building intrusion detection models based on IPv6, (LNCS-Lecture Notes in Computer Science 5576) Hal 608-618
Author: Zenghui Liu; Yingxu Lai; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Generation Of Cryptographic One-two-many Mapping IPv6 Address Using S-AES (E13-E18)
Author: N.Hakiem A.U.Riantoro M.U.Siddiqi T.H.Hasan; | Call Number: SEM-384 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Project promises accessible technology for the disabled* two efforts aim to upgrade mobile memory* Prime breakthorgh may improve encryption, page 26
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Design and Evaluation of Auto-ID Enabled Shopping Assistance Artifacts in Customers’ Mobile Phones: Two Retail Store Laboratory Experiments, Page 83-113
Author: Viswanath Venkatesh, John A. Aloysius, Hartmut Hoehle, and Scot Burton | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   19 20 21 22 23 24 25 26 27 28  Next