Your search for 38211 returns 4361 document(s) |
Efficient presentation of multivariate audit data for intusion detection of web-based internet services, (LNCS-Lecture Notes in Computer Science 2846) Hal. 63-75 |
Author: Zhi Guo; Kwok-Yan Lam; Siu-Leung Chung; Ming Gu, and Jia Guang Sun; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
on Updates of logic programs: a properties-based approach, The relative complexity of updates for a class of database views, LNCS-Lecture Notes in Computer Science 2942) Hal.231-251 |
Author: Mauricio Osorio and Fernando Zacarias; | Call Number: 006.33 Sei f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Multilingual topic generation within the CLEF 2001 experiemnts, Noun phrase translation for cross-language document selection, (LNCS-Lecture Notes in Computer Science 2406), Hal. 389-593 |
Author: Christa Womser Hacker; | Call Number: 025.04 Eva | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Compression: a key for next-generation text retrieval systems, page 37 |
Author: Nivio Ziviani | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Demonstrating real-time JPEG image compression-decompression using standard component IP cores on a programmable logic based platform for DSP and image processing, (LNCS-Lecture Notes in Computer Science 2147) Hal 441-450 |
Author: Albert Simpson; Jill Hunter; Moira Wylie; Yi Hu; David Mann; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Compositional and inductive semantic definitions in fixpoint, equational, constraint, closure-condition, rule-based and game-theoretic form, (LNCS-Lecture Notes in Computer Science 939) Hal 293-308 |
Author: Patrick Cousot; Radhia Cousot; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Some application of polynomials for the design of cryptographic protocols, (LNCS-Lecture Notes in Computer Science 2576) Hal 1-13 |
Author: Eyal Kushilevitz; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secure multi-party computation made simple, (LNCS-Lecture Notes in Computer Science 2576) Hal 14-28 |
Author: Ueli Maurer; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Weak forward security in mediated RSA, (LNCS-Lecture Notes in Computer Science 2576) Hal 45-54 |
Author: Gene Tsudik; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On the power of claw-free permulations, (LNCS-Lecture Notes in Computer Science 2576) Hal 55-73 |
Author: Yevgeniy Dodis; Leonid Reyzin; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|