Search Result Save to File Save as CSV
Your search for 37487 returns 3839 document(s)
Timing attack against implementation of a parallel algorithm for modular exponentiation, (LNCS-Lecture Notes in Computer Science 2576) Hal 319-330
Author: Yasuyuki Sakai; Kouichi Sakurai; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Design and implementation of an accelerated gabor filter bank using parallel hardware, (LNCS-Lecture Notes in Computer Science 2147) Hal 451-460
Author: Nikolaus VoR; Barbel Mertsching; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Improving performance of PHD function implementation on target association with multistatic radar system (MRS) using CUDA parallel computing
Author: Robertus Hudi; | Call Number: T-1260 (Softcopy T-968) Source code T-326 Mak T-64 | Edition: 2020 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Design and Implementation of High Bandwidth Real-Time Storage System Based on Parallel Computer Architecture (V1-241 -- V1-245)
Author: Nan Li Hui Xu Wei Yi Xin Xu Hongshan Nie; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Analisis topologi jaringan menggunakan algoritma linkrank untuk community detection pada himpunan data DBLP
Author: Muhammad Arvin Samuar; | Call Number: SK-1508 (Softcopy SK-990) | Edition: Satrio Baskoro Yudhoatmojo | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Crosstalk Analysis of Parallel Microstrip Line Using 4-Port Scattering Model
Author: Indar Surahmat , Sugihartono , Achmad Munir; | Call Number: SEM-368 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Toward maturity model of e-goverment implementation based on success factos
Author: Darmawan Napitupulu; dana indra sensue; | Call Number: sem-320 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Critical Success Factor of Security Maturity Model Implementation: A Systematic Literature Review
Author: Tashia Indah Nastiti; Setiadi YAzid; | Call Number: Mak T Jilid 071-095 (T-1284) (Mak T-083) | Type: Makalah Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Design and Implementation of a Negotiation Model based on the principle of Leverage (112-118)
Author: Patrick Gacirane Lasheng Yu; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Improving massively data parallel system performance with heterogeniety, Hal. 93-99
Author: Sam H. Noh; Klaudia Dussa Zieger; | Call Number: SEM-173 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next