Search Result Save to File Save as CSV
Your search for 37643 returns 4592 document(s)
A study on mosaic based CCTV system using localization, (LNCS-Lecture Notes in Computer Science 5576) Hal 814-822
Author: Jong-Min Kim; Myung-A Kang; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Challlenges in fixpoint computation with multisets, LNCS-Lecture Notes in Computer Science 5576), Hal. 273-301
Author: Nematollaah Shiri and Zhi Zheng; | Call Number: 006.33 Sei f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A New approach to malware detection, (LNCS-Lecture Notes in Computer Science 5576) Hal. 229-238
Author: Hongying Tang; Bo Zhu; Kui Ren; | Call Number: 005.3 Adv | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Model checking for infinite state systems using data abstraction, assumption-commitment style reasoning and theorem proving, (LNCS-Lecture Notes in Computer Science 939) Hal 54-69
Author: Jurgen Dingel; Thomas Filkorn; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Intelligent scheme of data security and message transmission, HAL. 453-455
Author: Prasun Chakrabarti; Shambit Saha, Ranjan Lahiri; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Recognizing partially occluded faces from a sungle exemplar image per person, (LNCS-Lecture Notes in Computer Science 5576) Hal. 100-109
Author: Hamidreza Rashidy Kanan; M. Shhram Moin; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
What about vulnerability to a fault attack of the miller's algorithm during an identify based protocols, (LNCS-Lecture Notes in Computer Science 5576) Hal. 122-134
Author: Nadia El Mrabet; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
On the security propeties and attacks againts mobile agent graph head scaling (MGHS), (LNCS-Lecture Notes in Computer Science 5576) Hal. 223-228
Author: Abid Khan; Qasim Arshad; Xiamu Niu; Zhang Yong; Muhammad Waqas Anwar; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Security evaluation of an infrusion tolerant web service architecture using stochastic activity networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 1-10Hal. 260-269
Author: Zahra Aghajani; Mohammad Abdollahi Azgomi; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Detection DDoS attack using dispersible traffic matrix and weighted moving average, (LNCS-Lecture Notes in Computer Science 5576) Hal. 290-300
Author: Tae Hwan Kim; Dong Seong Kim; Sang Min Lee; Jong Sou Park; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   10 11 12 13 14 15 16 17 18 19  Next