Search Result Save to File Save as CSV
Your search for 38165 returns 3519 document(s)
The split-proxy approach: a new architecture for parallel video servers, (LNCS-Lecture Notes in Computer Science 1557) Hal 327-336
Author: Giuseppe De Pietro; Marco Lerro; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A new algorithm for discrete timed symbolic model checking, (LNCS-Lecture Notes in Computer Science 1201) Hal 18-32
Author: Jurgen Ruf; Thomas Kropf; | Call Number: 004.33 Mal h | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A new heuristic for bad cycle detection using BDDs, LNCS-Lecture Notes in Computer Science 1254) Hal 268-278
Author: R. H. Shadin; R. P. Kurshan; S. K. Shukla; M. Y. Vardi; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
HYPROLOG: A new logic programming language with assumptions and abduction, (LNCS-Lecture Notes in Computer Science 3668) Hal 159-173
Author: Henning Christiansen; Veronica Dahl; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Timesets : a new method for temporal reasoning about programs,(LNCS-Lecture Notes in Computer Science 131) Hal. 177-199
Author: Leslie Lamport 1; | Call Number: 004 Lec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Weak forward security in mediated RSA, (LNCS-Lecture Notes in Computer Science 2576) Hal 45-54
Author: Gene Tsudik; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
On the security of two threshold signature schemes with traceable signers, (LNCS-Lecture Notes in Computer Science 2576) Hal 111-122
Author: Guilin Wang; Xiaoxi Han; Bo Zhu; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Security protocols for biometrics-based cardholder authentication in smartcards, (LNCS-Lecture Notes in Computer Science 2576) Hal 254-264
Author: Luciano Rila; Chris J. Mitchell; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
PS-LTL for constraint-based security protocol analysis, (LNCS-Lecture Notes in Computer Science 3668) Hal 439-440
Author: Ricardo Corin; Ari Saptawijaya; Sandro Etalle; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A Concrete security analysis for 3gpp-mac, (LNCS-Lecture Notes in Computer Science 2887) Hal 154-169
Author: Dowon Hong; Ju-Sung Kang; Bart Preneel; Heuisu Ryu; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next