Your search for 38308 returns 2778 document(s) |
A new algorithm for discrete timed symbolic model checking, (LNCS-Lecture Notes in Computer Science 1201) Hal 18-32 |
Author: Jurgen Ruf; Thomas Kropf; | Call Number: 004.33 Mal h | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An n log n algorithm for online BDD refinement, (LNCS-Lecture Notes in Computer Science 1254) Hal 107-118 |
Author: Nils Klarlund; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Algorithm refinement with read and write frames, (LNCS-Lecture Notes in Computer Science 670) Hal 148-161 |
Author: Juan Bicarregui; | Call Number: 004 Woo f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Geographic information system as determination of strategic locations and shortest routes in Bandung using dijkstra method ( hal. C-19/C-23 ) |
Author: Sari Armiati,Liane Okdinawati,Dewi Selviani Yulientinah; | Call Number: SEM-366 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Fast algorithm for computing histograms on a reconfigurable mesh, Hal. 244-251 |
Author: Ju-Wook Jang; Heonchul Park and Viktor K. Prasanna; | Call Number: SEM-173 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Pengembangan sistem manajemen parkiran mobil dengan metode shortest path peta spatial, Hal. 89-93 |
Author: Suharjito; | Call Number: SEM-276 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Performance evaluation of Cost effective routing for packet transmissions in mobile ad hoc network, (LNCS-Lecture Notes in Computer Science 5576) Hal. 494-501 |
Author: Kentaro Kishida, Toshihiko Sasama; Hiroshi Masuyama; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Hardware and software aspects for 3-D wavelet decomposition on shared memory MIMD computers, (LNCS-Lecture Notes in Computer Science 1557) Hal 347-356 |
Author: Rade Kutil; Andreas Uhl; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
What about vulnerability to a fault attack of the miller's algorithm during an identify based protocols, (LNCS-Lecture Notes in Computer Science 5576) Hal. 122-134 |
Author: Nadia El Mrabet; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Routing algorithm for PEC networks, Hal. 170-177 |
Author: Cho-Chin Lin; Viktor K. Prasanna; | Call Number: SEM-173 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|