Search Result Save to File Save as CSV
Your search for 38172 returns 3889 document(s)
Sensor disposition problem in wirelsess ad-hoc sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 485-493
Author: Takahide Yanaka; Toshihiko Susana; Hiroshi Masuyama; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
An efficient hybrid routing approach for hybrid wireles mesh networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 532-542
Author: Anh-Ngoc Lee; Dong-Won Kum, You-Ze Cho; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
DISHES: a distributed shell system for ubiquitous computing, (LNCS-Lecture Notes in Computer Science 5576) Hal. 553-562
Author: Chih Chun Lai; Ren-Song Ko; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Secure error-correction network coding in a randomized setting, (LNCS-Lecture Notes in Computer Science 5576) Hal. 570-577
Author: Yejun Zhou, Hui Li, Jianfeng Ma; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
FPGA Implementation of Elliptic Curve Point Multiplication over GF (2191), (LNCS-Lecture Notes in Computer Science 5576) Hal 619-634
Author: Sameh m. Shohdy; Ashraf b. El-sisi; Nabil Ismail; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Application of 2D barcode in hardcopy document verification system,(LNCS-Lecture Notes in Computer Science 5576) Hal 644-651
Author: Mazleena Salleh; Teoh Chin Yew; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Protecting global SOA and other security threats, (LNCS-Lecture Notes in Computer Science 5576) Hal 652-661
Author: Deven Shah; Ashish Mangal; Mayank Argawal; Mahendra Mehra; Tushar Dave; Dhiren Patel; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Authenticated encryption in WSN using eSTREAM ciphers, (LNCS-Lecture Notes in Computer Science 5576) Hal 741-749
Author: Shakil Ahmad; Arif Wahla; Firdous Kausar; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Device authentication/ authorization protocol for home network in next generation security, (LNCS-Lecture Notes in Computer Science 5576) Hal 760-768
Author: Jong Sik Moon; Deok Gyu Lee; Im-Yeong Lee; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A study on feasibility and establishment of a security grade certification scheme for the new IT services, (LNCS-Lecture Notes in Computer Science 5576) Hal 769-777
Author: Hangbae Chang; Jonggu Kang; Hyukjun Kwon; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   10 11 12 13 14 15 16 17 18 19  Next