Your search for 37655 returns 4244 document(s) |
Bayesian approach based comment spam defending tool, (LNCS-Lecture Notes in Computer Science 5576) Hal. 578-587 |
Author: Beatrice cynthia Dhinakaran; Dhinaharan Nagamalai; Jac-Kwang Lee; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A mathematical approach towards trust based security in pervasive computing environment, (LNCS-Lecture Notes in Computer Science 5576) Hal 702-711 |
Author: Naima Iltaf; Mukhtar Hussain; Farrukh Kamran; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The verus tool: a quantitative approach to the formal verification of real-time systems, (LNCS-Lecture Notes in Computer Science 1254) Hal 452-455 |
Author: Sergio Campos; Edmund Clarke; Marius Minea; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Trace table based approach for pipelined microprocessor verification, (LNCS-Lecture Notes in Computer Science 1254) Hal 364-375 |
Author: Jun Sawada; Warren A. Hunt Jr; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Trace table based approach for pipelined microprocessor verfication, (LNCS-Lecture Notes in Computer Science 1254), Hal. 364-375 |
Author: Jun Sawada and Warren A. Hunt Jr.; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An efficient hybrid routing approach for hybrid wireles mesh networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 532-542 |
Author: Anh-Ngoc Lee; Dong-Won Kum, You-Ze Cho; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A New approach to malware detection, (LNCS-Lecture Notes in Computer Science 5576) Hal. 229-238 |
Author: Hongying Tang; Bo Zhu; Kui Ren; | Call Number: 005.3 Adv | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Improved implementations of cryptosystems based on tate pairing, (LNCS-Lecture Notes in Computer Science 5576) Hal. 145-158 |
Author: Chang An Zhao; Dongqing Xie; Fangguo Zhang; Chong Zhi Gao; Jingwei Zhang; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Clustering-based frequency i-diversity anonymization,(LNCS-Lecture Notes in Computer Science 5576) Hal. 159-168 |
Author: Mohammad Reza; Zare-Mirakabad; Aman Jantan; Stephane Bressan; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Kademlia-based node lookup system for anonymization networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 179-190 |
Author: Benedikt Westermann; Andriy Panchenko; Lexi Pimenidis; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|