Your search for 38158 returns 5059 document(s) |
Pengembangan pervasive computing berbasis wireless sensor network dengan standar IEEE 802.15.4/Zighee |
Author: Budiarto; | Call Number: SK-1076 (Softcopy SK-557) Source Code SK-409 | Type: Skripsi
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Neighborhood-Consistent Transaction Management for Pervasive Computing Environments (276-286) |
Author: Filip Perich
Anupam Joshi
Yelena Yesha
Timothy Finin; | Call Number: SEM-381 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Towards risk-oriented security ontology, HAL. 170 - 174 |
Author: Basuki Rahmad, Suhono H. Supangkat; Jaka Sembiring; Kridanto Surendro; | Call Number: SEM-294 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Agent-Based Modelling for Developing Pervasive Persuasive Systems (23-28) |
Author: Budhitama Subagdja; | Call Number: SEM-345 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Demonstrating real-time JPEG image compression-decompression using standard component IP cores on a programmable logic based platform for DSP and image processing, (LNCS-Lecture Notes in Computer Science 2147) Hal 441-450 |
Author: Albert Simpson; Jill Hunter; Moira Wylie; Yi Hu; David Mann; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Compositional and inductive semantic definitions in fixpoint, equational, constraint, closure-condition, rule-based and game-theoretic form, (LNCS-Lecture Notes in Computer Science 939) Hal 293-308 |
Author: Patrick Cousot; Radhia Cousot; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
More detail for combined timing and power attack againt implementation of RSA, Efficient key updating signaturn schemes based on IBS, LNCS-Lecture Notes in Computer Science 2898) Hal. 245-263 |
Author: Werner Schinler and Colin D. Walter; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Mathematical logic for computer science |
Author: Ben-Ari, M.; | Call Number: 511.3 Ben m | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The dark side of timed opacity,(LNCS-Lecture Notes in Computer Science 5576) Hal. 21-30 |
Author: Frank Cassez; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Certificateless signature scheme without random oracles,(LNCS-Lecture Notes in Computer Science 5576) Hal. 31-40 |
Author: Vineela Muppavarapu ad Soon M. Chung; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|