Search Result Save to File Save as CSV
Your search for 38201 returns 4137 document(s)
Using the web information structures for retrieving web pages, (LNCS-Lecture Notes in Computer Science 4022), Hal. 892-897
Author: Mirna Adriani and Rama Pandugita; | Call Number: 025.004 Acc | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Remote user authentication using public information, LNCS-Lecture Notes in Computer Science 2898), Hal. 360-369
Author: Chris J. Mitchell; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Towards a generalized interaction scheme for information access, LNCS-Lecture Notes in Computer Science 2942), Hal.291-301
Author: Yannis Tzitzikas; Carlo Meghini; Nicolas Spyratos; | Call Number: 006.33 Sei f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
How to repair ESIGN,(LNCS-Lecture Notes in Computer Science 2576) Hal 234-240
Author: Louis Granboulan; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Reduction Zero-Knowledge, (LNCS-Lecture Notes in Computer Science 2576) Hal 303-317
Author: Xiaotie Deng; C.H.Lee; Yunlei Zhao; Hong Zhu; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Application of composition development method for definition of SYNTHESIS information resource query language semantics, (LNCS-Lecture Notes in Computer Science 670) Hal 428-441
Author: Leonid Kalinichenko; Nikolaj Nikitchenko; Vladimir Zadorozhny; | Call Number: 004 Woo f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Speech-driven text retrieval: using target ir collections for statistical language model adaptation in speech recognition, (LNCS-Lecture Notes in Computer Science 2773) Hal 94-104
Author: Atsushi Fujii; Katunobu Itou; Tetsuya Ishikawa; | Call Number: 006.4 Cod i | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Some application of polynomials for the design of cryptographic protocols, (LNCS-Lecture Notes in Computer Science 2576) Hal 1-13
Author: Eyal Kushilevitz; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Secure multi-party computation made simple, (LNCS-Lecture Notes in Computer Science 2576) Hal 14-28
Author: Ueli Maurer; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Forward secrecy in password-only key exchange protocols, (LNCS-Lecture Notes in Computer Science 2576) Hal 29-44
Author: Jonathan Katz; Rafail Ostrovsky; Moti Yung; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next