Search Result Save to File Save as CSV
Your search for 37654 returns 3093 document(s)
Challlenges in fixpoint computation with multisets, LNCS-Lecture Notes in Computer Science 5576), Hal. 273-301
Author: Nematollaah Shiri and Zhi Zheng; | Call Number: 006.33 Sei f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A New approach to malware detection, (LNCS-Lecture Notes in Computer Science 5576) Hal. 229-238
Author: Hongying Tang; Bo Zhu; Kui Ren; | Call Number: 005.3 Adv | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Building secure and reliable network applicatins/Kenneth P. Birman
Author: Birman, Kenneth P.; | Call Number: 004.36 Bir b | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Honeypot based Secure Network System (519-528)
Author: Yogendra Kumar Jain Surabhi Singh; | Call Number: SEM-323 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Improving network calculus for performance analysis in network coding, 480-485
Author: Huanzhong Li, Quanyou Feng, Rongsen Li, Wenhua Dou; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Source-channel coding of video signals for transmission in heterogeneous network with collisions, Hal. 502-507
Author: Gustavo A. Santana; Adriana Viveros S.; | Call Number: SEM-259 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Cooperative Diversity through Network Coding in Satellite Communications (V1-28 -- V1-33)
Author: Wei Sun Geng-xin Zhang; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Recognizing partially occluded faces from a sungle exemplar image per person, (LNCS-Lecture Notes in Computer Science 5576) Hal. 100-109
Author: Hamidreza Rashidy Kanan; M. Shhram Moin; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
What about vulnerability to a fault attack of the miller's algorithm during an identify based protocols, (LNCS-Lecture Notes in Computer Science 5576) Hal. 122-134
Author: Nadia El Mrabet; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Key-insulated encryption based key pre-distribution scheme fo WSN, (LNCS-Lecture Notes in Computer Science 5576) Hal. 200-209
Author: Weidong Qiu; Yaowei Zhou; Bo Zhu; Yanfei Zheng; Mi Wen; Zheng Gong; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   4 5 6 7 8 9 10 11 12 13  Next