Your search for 34711 returns 632 document(s) |
Dampak penggunaan community access point (telecenter) sampai tingkat pedesaan di Jawa TImur, Hal. 1.1-1.5 |
Author: Asianti Oetojo; | Call Number: SEM-272 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Teknologi unlicensed mobile access (UMA), untuk rural next generation network (R-NGN), Hal. 323-328 |
Author: Arinuddin Umar; | Call Number: SEM-271 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Design of an OPAC database to permit different subject searching access in a multi-discliplines University Library Catalogue database, Hal. 245-255 |
Author: Maristella Agost; Maurizio Masotti; | Call Number: SEM-254 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Lower bounds for union-split-find related problems on random access machines,Hal 625-634 |
Author: Peter Bro Miltersen; | Call Number: SEM-202 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Fine-grain access control using shibboleth for the storage resource broker,(LNCS-Lecture Notes in Computer Science 5576) Hal. 41-50 |
Author: Vineela Muppavarapu; Soon M. Chung; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Grouping provenance information to improve efficiency of access control, (LNCS-Lecture Notes in Computer Science 5576) Hal. 51-59 |
Author: Amril Syalim; Yoshiaki; Konichi Sakurai; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Selective regression test for access control systems employing RBCA,(LNCS-Lecture Notes in Computer Science 5576) Hal. 70-79 |
Author: Chao Huang; Jianling Sun; Xinyu Wang; Yuanjie Si; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Formal verification for access control in web information sharing system, (LNCS-Lecture Notes in Computer Science 5576) Hal. 80-89 |
Author: Akihiro Sakai; Yoshiaki Hori; Kouichi Sakurai; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secret sharing schemes on access structures with intersection number equal to one (LNCS-Lecture Notes in Computer Science 2576) 354 |
Author: Jaume Marti-Farre; Carles Padro; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Towards a generalized interaction scheme for information access, LNCS-Lecture Notes in Computer Science 2942), Hal.291-301 |
Author: Yannis Tzitzikas; Carlo Meghini; Nicolas Spyratos; | Call Number: 006.33 Sei f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|