Search Result Save to File Save as CSV
Your search for 38308 returns 2778 document(s)
A new algorithm for discrete timed symbolic model checking, (LNCS-Lecture Notes in Computer Science 1201) Hal 18-32
Author: Jurgen Ruf; Thomas Kropf; | Call Number: 004.33 Mal h | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
An n log n algorithm for online BDD refinement, (LNCS-Lecture Notes in Computer Science 1254) Hal 107-118
Author: Nils Klarlund; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Algorithm refinement with read and write frames, (LNCS-Lecture Notes in Computer Science 670) Hal 148-161
Author: Juan Bicarregui; | Call Number: 004 Woo f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Geographic information system as determination of strategic locations and shortest routes in Bandung using dijkstra method ( hal. C-19/C-23 )
Author: Sari Armiati,Liane Okdinawati,Dewi Selviani Yulientinah; | Call Number: SEM-366 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A Fast algorithm for computing histograms on a reconfigurable mesh, Hal. 244-251
Author: Ju-Wook Jang; Heonchul Park and Viktor K. Prasanna; | Call Number: SEM-173 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan sistem manajemen parkiran mobil dengan metode shortest path peta spatial, Hal. 89-93
Author: Suharjito; | Call Number: SEM-276 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Performance evaluation of Cost effective routing for packet transmissions in mobile ad hoc network, (LNCS-Lecture Notes in Computer Science 5576) Hal. 494-501
Author: Kentaro Kishida, Toshihiko Sasama; Hiroshi Masuyama; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Hardware and software aspects for 3-D wavelet decomposition on shared memory MIMD computers, (LNCS-Lecture Notes in Computer Science 1557) Hal 347-356
Author: Rade Kutil; Andreas Uhl; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
What about vulnerability to a fault attack of the miller's algorithm during an identify based protocols, (LNCS-Lecture Notes in Computer Science 5576) Hal. 122-134
Author: Nadia El Mrabet; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A Routing algorithm for PEC networks, Hal. 170-177
Author: Cho-Chin Lin; Viktor K. Prasanna; | Call Number: SEM-173 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next