Your search for 37651 returns 5242 document(s) |
Relationship between motivation and satisfaction of online computer games: evidence from adolsescent players using wireless service in Taiwan, (LNCS-Lecture Notes in Computer Science 5576) Hal. 541-552 |
Author: Lily Shui-Lien Chen; Michael Chih-Hung Wang; Yung Hsin Lee; | Call Number: 005.3 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security evaluation of an infrusion tolerant web service architecture using stochastic activity networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 1-10Hal. 260-269 |
Author: Zahra Aghajani; Mohammad Abdollahi Azgomi; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Motivation from a full-rate specific design to a DSP core approach for GSM vocoders, (LNCS-Lecture Notes in Computer Science 2147) Hal 388-397 |
Author: Shervin Sheidaei; Hamid Noori; Ahmad Akbari; Hosein Pedram; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Hardware-based random number generation in wireless sensor(WSNs), (LNCS-Lecture Notes in Computer Science 5576) Hal 732-740 |
Author: Rabia Latif; Mukhtar Hussain; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Attack pattern discovery by frequent episodes mining from honeypot systems, (LNCS-Lecture Notes in Computer Science 5576) Hal. 301-316 |
Author: Ming Yang Su, Kai Chi Chang; Chun-Yuen Lin; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Improved location acquisition algorithms for the location-based alert service, (LNCS-Lecture Notes in Computer Science 5576) Hal. 461-470 |
Author: So Young Kang, Jin-Wong, Kwang Jo Lee, Ju-Hee Lee, Ji-Hoon Kim, Shung-Bong Yang; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A study of international trend analysis on web service vulnerabilities in OWASP and WASC, (LNCS-Lecture Notes in Computer Science 5576) Hal 788-796 |
Author: Soonseok Kim; Haeyoung Han; Donghwi Shin; Inkyung Jeun; HyunCheol Jeong; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Fine-grain access control using shibboleth for the storage resource broker,(LNCS-Lecture Notes in Computer Science 5576) Hal. 41-50 |
Author: Vineela Muppavarapu; Soon M. Chung; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Attention : attackER traceback using MAC layer abnormalilty detection, (LNCS-Lecture Notes in Computer Science 5576) Hal. 239-249 |
Author: Yongjin Kim; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Authenticated encryption in WSN using eSTREAM ciphers, (LNCS-Lecture Notes in Computer Science 5576) Hal 741-749 |
Author: Shakil Ahmad; Arif Wahla; Firdous Kausar; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|