Search Result Save to File Save as CSV
Your search for 38297 returns 3296 document(s)
An efficient hybrid routing approach for hybrid wireles mesh networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 532-542
Author: Anh-Ngoc Lee; Dong-Won Kum, You-Ze Cho; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Bayesian approach based comment spam defending tool, (LNCS-Lecture Notes in Computer Science 5576) Hal. 578-587
Author: Beatrice cynthia Dhinakaran; Dhinaharan Nagamalai; Jac-Kwang Lee; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
The split-proxy approach: a new architecture for parallel video servers, (LNCS-Lecture Notes in Computer Science 1557) Hal 327-336
Author: Giuseppe De Pietro; Marco Lerro; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Trace table based approach for pipelined microprocessor verification, (LNCS-Lecture Notes in Computer Science 1254) Hal 364-375
Author: Jun Sawada; Warren A. Hunt Jr; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
The verus tool: a quantitative approach to the formal verification of real-time systems, (LNCS-Lecture Notes in Computer Science 1254) Hal 452-455
Author: Sergio Campos; Edmund Clarke; Marius Minea; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
An automata-theoretic approach to fair realizability and synthesis, (LNCS-Lecture Notes in Computer Science 939) Hal 267-278
Author: Moshe Y. Vardi; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Trace table based approach for pipelined microprocessor verfication, (LNCS-Lecture Notes in Computer Science 1254), Hal. 364-375
Author: Jun Sawada and Warren A. Hunt Jr.; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A New approach to malware detection, (LNCS-Lecture Notes in Computer Science 5576) Hal. 229-238
Author: Hongying Tang; Bo Zhu; Kui Ren; | Call Number: 005.3 Adv | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Dictionary of computing: data communications hardware and software basic digital electronics/ edited by Frank J. Galland
Call Number: R. 004.03 Dic | Type: Buku Referensi
Find Similar |  Add To Favorites |  Detail in New Window 
A Fast algorithm for computing histograms on a reconfigurable mesh, Hal. 244-251
Author: Ju-Wook Jang; Heonchul Park and Viktor K. Prasanna; | Call Number: SEM-173 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next