Your search for 37654 returns 3093 document(s) |
Challlenges in fixpoint computation with multisets, LNCS-Lecture Notes in Computer Science 5576), Hal. 273-301 |
Author: Nematollaah Shiri and Zhi Zheng; | Call Number: 006.33 Sei f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A New approach to malware detection, (LNCS-Lecture Notes in Computer Science 5576) Hal. 229-238 |
Author: Hongying Tang; Bo Zhu; Kui Ren; | Call Number: 005.3 Adv | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Building secure and reliable network applicatins/Kenneth P. Birman |
Author: Birman, Kenneth P.; | Call Number: 004.36 Bir b | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Honeypot based Secure Network System (519-528) |
Author: Yogendra Kumar Jain
Surabhi Singh; | Call Number: SEM-323 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Improving network calculus for performance analysis in network coding, 480-485 |
Author: Huanzhong Li, Quanyou Feng, Rongsen Li, Wenhua Dou; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Source-channel coding of video signals for transmission in heterogeneous network with collisions, Hal. 502-507 |
Author: Gustavo A. Santana; Adriana Viveros S.; | Call Number: SEM-259 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cooperative Diversity through Network Coding in Satellite Communications (V1-28 -- V1-33) |
Author: Wei Sun
Geng-xin Zhang; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Recognizing partially occluded faces from a sungle exemplar image per person, (LNCS-Lecture Notes in Computer Science 5576) Hal. 100-109 |
Author: Hamidreza Rashidy Kanan; M. Shhram Moin; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
What about vulnerability to a fault attack of the miller's algorithm during an identify based protocols, (LNCS-Lecture Notes in Computer Science 5576) Hal. 122-134 |
Author: Nadia El Mrabet; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Key-insulated encryption based key pre-distribution scheme fo WSN, (LNCS-Lecture Notes in Computer Science 5576) Hal. 200-209 |
Author: Weidong Qiu; Yaowei Zhou; Bo Zhu; Yanfei Zheng; Mi Wen; Zheng Gong; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|