Your search for 37547 returns 660 document(s) |
Introduction to algorithm design and structured programming |
Author: Reed, Thomas A.; | Call Number: 005.1 Ree i | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Routing algorithm for PEC networks, Hal. 170-177 |
Author: Cho-Chin Lin; Viktor K. Prasanna; | Call Number: SEM-173 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Document image recognition based on template matching of component block projections, page 1188 |
Author: H. Peng | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The superiority of fibonacci sequence as partition sizes in ranking stage in word-based block sorting text compression, HAL. 391- 396 |
Author: R. Yugo Kartono Isal; | Call Number: SEM-294 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Digital watermarking using inter-block correlation: extension to JPEG coded domain, Hal. 133- 138 |
Author: Yoonki Choi; Kiyoharu Aizawa; | Call Number: SEM-259 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Studi perbandingan beberapa algoritma tekik pencarian heuristic untuk menyelesaikan problem block world, Hal. 197-258 |
Author: Pambudi Soenarsihanto; Mira Hidayati; | Call Number: SEM-231 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Cryptanalytic view of the NSA's skipjack block cipher design, (LNCS-Lecture Notes in Computer Science 5576) Hal. 368-381 |
Author: Jongsung Kim; Raphael C.W. Phan; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptanalysis of block ciphers based on sha-1 and md5, (LNCS-Lecture Notes in Computer Science 2887) Hal 36-44 |
Author: Markku-Juhani O. Saarinen; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Block ciphers and systems of quadratic equations, (LNCS-Lecture Notes in Computer Science 2887) Hal 274-289 |
Author: Alex Biryukov; Christophe De Canniere; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The security of one block to many modes of operation, (LNCS-Lecture Notes in Computer Science 2887) Hal 376-395 |
Author: Henri Gilbert; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|