Search Result Save to File Save as CSV
Your search for 38158 returns 5059 document(s)
Real-time collaboration in heterogeneous computing environment, Hal. 222-227
Author: Ivan Marsic; | Call Number: SEM-259 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A Middleware for Smart Object in Ubiquitous Computing Environment (400-403)
Author: EunJung KO JiHoon Kang JongHyun Park; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Discrete mathematical structures for computer science
Author: Bernard Kolman; | Call Number: 511 Ber i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
A Pessimistic approach to trust in mobile agent platforms, page 40
Author: Uwe G.W. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Recognizing partially occluded faces from a sungle exemplar image per person, (LNCS-Lecture Notes in Computer Science 5576) Hal. 100-109
Author: Hamidreza Rashidy Kanan; M. Shhram Moin; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Detection DDoS attack using dispersible traffic matrix and weighted moving average, (LNCS-Lecture Notes in Computer Science 5576) Hal. 290-300
Author: Tae Hwan Kim; Dong Seong Kim; Sang Min Lee; Jong Sou Park; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Side-channel leakage in masked circuits caoused by higher-order circuit effects, (LNCS-Lecture Notes in Computer Science 5576) Hal. 325-336
Author: Zhimin Chen; Syed Haider; Patrick Schaumont; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Performance analysis of digital secure voice transmission over HF radio channel, (LNCS-Lecture Notes in Computer Science 5576) Hal. 337-346
Author: Kihong Kim; Jinkeun Hong; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Secure multi-party computation using virtual parties for computation on encrypted data, (LNCS-Lecture Notes in Computer Science 5576) Hal. 412-421
Author: Rohit Pathak; Satyadhar Joshi; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A reliable and efficient pedal back data disseminating scheme for Ad-Hoc WSNs, (LNCS-Lecture Notes in Computer Science 5576) Hal. 450-460
Author: Nomica Imran; A.I. Khan; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   14 15 16 17 18 19 20 21 22 23  Next