Your search for 38201 returns 4137 document(s) |
Using the web information structures for retrieving web pages, (LNCS-Lecture Notes in Computer Science 4022), Hal. 892-897 |
Author: Mirna Adriani and Rama Pandugita; | Call Number: 025.004 Acc | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Remote user authentication using public information, LNCS-Lecture Notes in Computer Science 2898), Hal. 360-369 |
Author: Chris J. Mitchell; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Towards a generalized interaction scheme for information access, LNCS-Lecture Notes in Computer Science 2942), Hal.291-301 |
Author: Yannis Tzitzikas; Carlo Meghini; Nicolas Spyratos; | Call Number: 006.33 Sei f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
How to repair ESIGN,(LNCS-Lecture Notes in Computer Science 2576) Hal 234-240 |
Author: Louis Granboulan; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Reduction Zero-Knowledge, (LNCS-Lecture Notes in Computer Science 2576) Hal 303-317 |
Author: Xiaotie Deng; C.H.Lee; Yunlei Zhao; Hong Zhu; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Application of composition development method for definition of SYNTHESIS information resource query language semantics, (LNCS-Lecture Notes in Computer Science 670) Hal 428-441 |
Author: Leonid Kalinichenko; Nikolaj Nikitchenko; Vladimir Zadorozhny; | Call Number: 004 Woo f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Speech-driven text retrieval: using target ir collections for statistical language model adaptation in speech recognition, (LNCS-Lecture Notes in Computer Science 2773) Hal 94-104 |
Author: Atsushi Fujii; Katunobu Itou; Tetsuya Ishikawa; | Call Number: 006.4 Cod i | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Some application of polynomials for the design of cryptographic protocols, (LNCS-Lecture Notes in Computer Science 2576) Hal 1-13 |
Author: Eyal Kushilevitz; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secure multi-party computation made simple, (LNCS-Lecture Notes in Computer Science 2576) Hal 14-28 |
Author: Ueli Maurer; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Forward secrecy in password-only key exchange protocols, (LNCS-Lecture Notes in Computer Science 2576) Hal 29-44 |
Author: Jonathan Katz; Rafail Ostrovsky; Moti Yung; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|