Search Result Save to File Save as CSV
Your search for 38172 returns 3889 document(s)
A study of international trend analysis on web service vulnerabilities in OWASP and WASC, (LNCS-Lecture Notes in Computer Science 5576) Hal 788-796
Author: Soonseok Kim; Haeyoung Han; Donghwi Shin; Inkyung Jeun; HyunCheol Jeong; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Free-form deformation axis aligned bounding box, (LNCS-Lecture Notes in Computer Science 5576) Hal 804-813
Author: Sunhwa Jung; Min Hong; Min-Hyung Choi; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Challlenges in fixpoint computation with multisets, LNCS-Lecture Notes in Computer Science 5576), Hal. 273-301
Author: Nematollaah Shiri and Zhi Zheng; | Call Number: 006.33 Sei f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A New approach to malware detection, (LNCS-Lecture Notes in Computer Science 5576) Hal. 229-238
Author: Hongying Tang; Bo Zhu; Kui Ren; | Call Number: 005.3 Adv | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
CAM: Developments in computer-integrated manufacturing/ edited by D. Kochan
Call Number: 670.285 Cam | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Design of Vehicle Start Safety Control System based on IOT (V1-703 -- V1-704)
Author: Shengli Bao; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Safety-critical computer sytems/Neil Storey
Author: Storey, Neil; | Call Number: 004.33 Sto s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Design and Implementation of High Bandwidth Real-Time Storage System Based on Parallel Computer Architecture (V1-241 -- V1-245)
Author: Nan Li Hui Xu Wei Yi Xin Xu Hongshan Nie; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Recognizing partially occluded faces from a sungle exemplar image per person, (LNCS-Lecture Notes in Computer Science 5576) Hal. 100-109
Author: Hamidreza Rashidy Kanan; M. Shhram Moin; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
On the security propeties and attacks againts mobile agent graph head scaling (MGHS), (LNCS-Lecture Notes in Computer Science 5576) Hal. 223-228
Author: Abid Khan; Qasim Arshad; Xiamu Niu; Zhang Yong; Muhammad Waqas Anwar; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   11 12 13 14 15 16 17 18 19 20  Next