Your search for 38211 returns 4361 document(s) |
Dictionary-based Thai CLIR: an experimental survey of Thai CLIR, (LNCS-Lecture Notes in Computer Science, 2406), Hal. 209-218 |
Author: Jaruskulchai Chullerat; | Call Number: 025.04 Eva | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The performance of a machine traslation-Based English-Indonesia CLIR system (LNCS-Lecture Notes in Computer Science 4022) Hal. |
Author: Mirna Adriani, Ihsan Wahyu; | Call Number: 025.004 Acc | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Multifunctional turbo-based receiver using partial unit memory codes, (LNCS-Lecture Notes in Computer Science 2898), Hal. 24-34 |
Author: Lina Pagoonee and Bahran Honary; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A General attack model on hash-based client puzzles, (LNCS-Lecture Notes in Computer Science 2898),Hal. 319-331 |
Author: Geraint Price; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Generalized linear complementarity problems and the analysis of continuously variable systems and discrete event systems,(LNCS-Lecture Notes in Computer Science 1201) Hal 409-414 |
Author: Bart De Schutter; Bart De Moor; | Call Number: 004.33 Mal h | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Threshold Based Declustering in High Dimensions (818-827) |
Author: Ali Saman Tosun; | Call Number: SEM-375 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On the parallel implementation of the fast wavelet packet transform on MIMD distributed memory environments, (LNCS-Lecture Notes in Computer Science 1557) Hal 357-366 |
Author: Stefania Corsaro; Luisa D' Amore; Almerico Murli; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
How to repair ESIGN,(LNCS-Lecture Notes in Computer Science 2576) Hal 234-240 |
Author: Louis Granboulan; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Reduction Zero-Knowledge, (LNCS-Lecture Notes in Computer Science 2576) Hal 303-317 |
Author: Xiaotie Deng; C.H.Lee; Yunlei Zhao; Hong Zhu; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
What about vulnerability to a fault attack of the miller's algorithm during an identify based protocols, (LNCS-Lecture Notes in Computer Science 5576) Hal. 122-134 |
Author: Nadia El Mrabet; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|