Your search for 38178 returns 3940 document(s) |
Efficient software implementation of LFSR and boolean function and its application in nonlinear combiner model, (LNCS-Lecture Notes in Computer Science 2576) Hal 387-402 |
Author: Sandeepan Chowdhury; Subhamoy Maitra; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Tractable clones of polynomials over semigroups, (LNCS-Lecture Notes in Computer Science 3709) Hal 196-210 |
Author: Victor Dalmau; Ricard Gavalda; Pascal Tesson; Denis Therien; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Structureal analysis and design : some minicomputer application (in two parts) part 1 |
Author: Harrison, Howard Bernard; | Call Number: 004.22 Har s | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Some thoughts on statecharts, 13 years later, (LNCS-Lecture Notes in Computer Science 1254) Hal 226-231 |
Author: David Harel; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Some progress in the symbolic verification of timed automata, (LNCS-Lecture Notes in Computer Science 1254) Hal 179-190 |
Author: Marius Bozga; Oded Maler; Amir Pnueli; Sergio Yovine; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Formal verification for fault-tolerant architectures: some lessons learned, (LNCS-Lecture Notes in Computer Science 670) Hal 482-500 |
Author: Sam Owre; John Rushby; Natarajan Shankar; Friedrich von Henke; | Call Number: 004 Woo f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Some observations on compositional semantics, (LNCS-Lecture Notes in Computer Science 131)Hal. 137-149 |
Author: Theo M.V. Janssen; Peter van Emde Bosa; | Call Number: 004 Lec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Does it need trusted third party? design of buyyer-seller watermarking protocol without trusted third party, (LNCS-Lecture Notes in Computer Science 2576) Hal 265-279 |
Author: Jae-Gwi Choi; Kouichi Sakurai; Ji-Hwan Park; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Protocols using anonymous connections: mobile applications, (LNCS-Lecture Notes in Computer Science 1361) Hal 13-23 |
Author: Michael G. Reed; Paul F. Syverson; David M. Goldschlag; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Entity authentication and authenticated key transport protocols employing asymmetric techniques, (LNCS-Lecture Notes in Computer Science 1361) Hal 137-158 |
Author: Simon Blake-Wilson; Alfred Menezes; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|