Your search for 31423 returns 4649 document(s) |
Performance evaluation of a distributed architecture for information retrieval, Hal. 110-118 |
Author: Brendon Gahroon; Kathryn S. McKinley; | Call Number: SEM-248 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
ARAS: asynchonous risc architecture simulator; Hal. 210- 219 |
Author: Chia-Hsing; Chien; Mark A. Franklin; Tienyo Pan; Prithvi Prabhu; | Call Number: SEM-234 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Exact: algorithm and hardware architecture for an improved a-buffer,Hal 85-91 |
Author: Andreas Schilling; Wolfgang Straber; | Call Number: SEM-199 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Vb2 an architecture for interaction in synthetic worlds, Hal 167-178 |
Author: Enrico Gobbetti; Jean-Francis Balaguer; | Call Number: SEM-194 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A framework for shared applications with a replicated architecture, Hal 249-257 |
Author: Thomas Berlage; Andreas Genau; | Call Number: SEM-194 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Solaris 2.4 solaris XGL architecture guide |
Call Number: 005.43 Sol | Type: Buku Manual
|
Find Similar |
Add To Favorites |
Detail in New Window
|
3D reconstruction of architecture from image sequences, Hal. 3001-304 |
Author: Yan Liang, Yehua Sheng, Hongquan Song, Yongzhi Wang; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Scalable architecture for classifying network security threats, Hal. 3061-3064 |
Author: Jian Tang; Dongxia Wang; Liang Ming and Xiang Li; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
ALFA: a static data flow architecture, Hal. 318-325 |
Author: L. Verdoscia; R. Vaccaro; | Call Number: SEM-173 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A trusted PKI architecture based on fingerprint encryption, 336-340 |
Author: Jiangming Cui, Xiaojun Zhang, Nan Su, Zongsheng Lai; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|