Search Result Save to File Save as CSV
Your search for 38158 returns 5059 document(s)
Pengembangan pervasive computing berbasis wireless sensor network dengan standar IEEE 802.15.4/Zighee
Author: Budiarto; | Call Number: SK-1076 (Softcopy SK-557) Source Code SK-409 | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Neighborhood-Consistent Transaction Management for Pervasive Computing Environments (276-286)
Author: Filip Perich Anupam Joshi Yelena Yesha Timothy Finin; | Call Number: SEM-381 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Towards risk-oriented security ontology, HAL. 170 - 174
Author: Basuki Rahmad, Suhono H. Supangkat; Jaka Sembiring; Kridanto Surendro; | Call Number: SEM-294 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Agent-Based Modelling for Developing Pervasive Persuasive Systems (23-28)
Author: Budhitama Subagdja; | Call Number: SEM-345 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Demonstrating real-time JPEG image compression-decompression using standard component IP cores on a programmable logic based platform for DSP and image processing, (LNCS-Lecture Notes in Computer Science 2147) Hal 441-450
Author: Albert Simpson; Jill Hunter; Moira Wylie; Yi Hu; David Mann; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Compositional and inductive semantic definitions in fixpoint, equational, constraint, closure-condition, rule-based and game-theoretic form, (LNCS-Lecture Notes in Computer Science 939) Hal 293-308
Author: Patrick Cousot; Radhia Cousot; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
More detail for combined timing and power attack againt implementation of RSA, Efficient key updating signaturn schemes based on IBS, LNCS-Lecture Notes in Computer Science 2898) Hal. 245-263
Author: Werner Schinler and Colin D. Walter; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Mathematical logic for computer science
Author: Ben-Ari, M.; | Call Number: 511.3 Ben m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
The dark side of timed opacity,(LNCS-Lecture Notes in Computer Science 5576) Hal. 21-30
Author: Frank Cassez; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Certificateless signature scheme without random oracles,(LNCS-Lecture Notes in Computer Science 5576) Hal. 31-40
Author: Vineela Muppavarapu ad Soon M. Chung; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   10 11 12 13 14 15 16 17 18 19  Next