Your search for 38234 returns 2911 document(s) |
Sensor disposition problem in wirelsess ad-hoc sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 485-493 |
Author: Takahide Yanaka; Toshihiko Susana; Hiroshi Masuyama; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secure error-correction network coding in a randomized setting, (LNCS-Lecture Notes in Computer Science 5576) Hal. 570-577 |
Author: Yejun Zhou, Hui Li, Jianfeng Ma; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Bayesian approach based comment spam defending tool, (LNCS-Lecture Notes in Computer Science 5576) Hal. 578-587 |
Author: Beatrice cynthia Dhinakaran; Dhinaharan Nagamalai; Jac-Kwang Lee; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Honeybee-based model to detect intrusion, (LNCS-Lecture Notes in Computer Science 5576) Hal. 598-607 |
Author: Ghassan Ahmed Ali; Aman Jantan; Abdulghani Ali; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A data mining framework for building intrusion detection models based on IPv6, (LNCS-Lecture Notes in Computer Science 5576) Hal 608-618 |
Author: Zenghui Liu; Yingxu Lai; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
FPGA Implementation of Elliptic Curve Point Multiplication over GF (2191), (LNCS-Lecture Notes in Computer Science 5576) Hal 619-634 |
Author: Sameh m. Shohdy; Ashraf b. El-sisi; Nabil Ismail; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Forward-secrecy WTLS handshake protocol based on XTR, (LNCS-Lecture Notes in Computer Science 5576) Hal 635-643 |
Author: Bin Li; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Application of 2D barcode in hardcopy document verification system,(LNCS-Lecture Notes in Computer Science 5576) Hal 644-651 |
Author: Mazleena Salleh; Teoh Chin Yew; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Protecting global SOA and other security threats, (LNCS-Lecture Notes in Computer Science 5576) Hal 652-661 |
Author: Deven Shah; Ashish Mangal; Mayank Argawal; Mahendra Mehra; Tushar Dave; Dhiren Patel; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A mathematical approach towards trust based security in pervasive computing environment, (LNCS-Lecture Notes in Computer Science 5576) Hal 702-711 |
Author: Naima Iltaf; Mukhtar Hussain; Farrukh Kamran; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|