Search Result Save to File Save as CSV
Your search for 31423 returns 4649 document(s)
Performance evaluation of a distributed architecture for information retrieval, Hal. 110-118
Author: Brendon Gahroon; Kathryn S. McKinley; | Call Number: SEM-248 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
ARAS: asynchonous risc architecture simulator; Hal. 210- 219
Author: Chia-Hsing; Chien; Mark A. Franklin; Tienyo Pan; Prithvi Prabhu; | Call Number: SEM-234 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Exact: algorithm and hardware architecture for an improved a-buffer,Hal 85-91
Author: Andreas Schilling; Wolfgang Straber; | Call Number: SEM-199 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Vb2 an architecture for interaction in synthetic worlds, Hal 167-178
Author: Enrico Gobbetti; Jean-Francis Balaguer; | Call Number: SEM-194 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A framework for shared applications with a replicated architecture, Hal 249-257
Author: Thomas Berlage; Andreas Genau; | Call Number: SEM-194 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Solaris 2.4 solaris XGL architecture guide
Call Number: 005.43 Sol | Type: Buku Manual
Find Similar |  Add To Favorites |  Detail in New Window 
3D reconstruction of architecture from image sequences, Hal. 3001-304
Author: Yan Liang, Yehua Sheng, Hongquan Song, Yongzhi Wang; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A Scalable architecture for classifying network security threats, Hal. 3061-3064
Author: Jian Tang; Dongxia Wang; Liang Ming and Xiang Li; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
ALFA: a static data flow architecture, Hal. 318-325
Author: L. Verdoscia; R. Vaccaro; | Call Number: SEM-173 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A trusted PKI architecture based on fingerprint encryption, 336-340
Author: Jiangming Cui, Xiaojun Zhang, Nan Su, Zongsheng Lai; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   10 11 12 13 14 15 16 17 18 19  Next