Search Result Save to File Save as CSV
Your search for 38167 returns 5224 document(s)
Formal verification for access control in web information sharing system, (LNCS-Lecture Notes in Computer Science 5576) Hal. 80-89
Author: Akihiro Sakai; Yoshiaki Hori; Kouichi Sakurai; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Performance analysis of digital secure voice transmission over HF radio channel, (LNCS-Lecture Notes in Computer Science 5576) Hal. 337-346
Author: Kihong Kim; Jinkeun Hong; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A comparative analysis of HC-128 and rabbit encryption schemes for pervasive computing in WSN environment, (LNCS-Lecture Notes in Computer Science 5576) Hal 682-691
Author: Firdous Kausar; Ayesha Naureen; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A comparative analysis of PKC and semi-PKC based key management schemes for hierarchical sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 692-701
Author: Ayesha Naureen; Attiya Akram; Rabia Riaz; Ki-Hyung Kim; H. Farooq Ahmed; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Interval analysis in scheduling, (LNCS-Lecture Notes in Computer Science 3709) Hal 226-240
Author: Jerome Fortin; Pawel Zielinski; Didier Dubois; Helene Fargier; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Analysis of rmac, (LNCS-Lecture Notes in Computer Science 2887) Hal 182-191
Author: Lars R. Knudsen; Tadayoshi Kohno; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Relationship between motivation and satisfaction of online computer games: evidence from adolsescent players using wireless service in Taiwan, (LNCS-Lecture Notes in Computer Science 5576) Hal. 541-552
Author: Lily Shui-Lien Chen; Michael Chih-Hung Wang; Yung Hsin Lee; | Call Number: 005.3 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
The use of speech retrieval systems: a study design, (LNCS-Lecture Notes in Computer Science 2773) Hal 86-93
Author: Jinmook Kim; Douglas W. Oard; | Call Number: 006.4 Cod i | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A case study in timed CSP: The railroad crossing problem, (LNCS-Lecture Notes in Computer Science 1201) Hal 69-74
Author: Luming Lai; Phil Watson; | Call Number: 004.33 Mal h | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Safety verification for automated platoon maneuvers: a case study, (LNCS-Lecture Notes in Computer Science 1201) Hal 154-170
Author: Ekaterina Dolginova; Nancy Lynch; | Call Number: 004.33 Mal h | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next