Your search for 38310 returns 4249 document(s) |
Coordination of many agents, (LNCS-Lecture Notes in Computer Science 3668) Hal 98-112 |
Author: Joxan Jaffar; Roland H.C.Yap; Kenny Q. Zhu; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A type system for CHR,( (LNCS-Lecture Notes in Computer Science 3668) Hal 402-403 |
Author: Emmanuel Coquery; Francois Fages; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Application of composition development method for definition of SYNTHESIS information resource query language semantics, (LNCS-Lecture Notes in Computer Science 670) Hal 428-441 |
Author: Leonid Kalinichenko; Nikolaj Nikitchenko; Vladimir Zadorozhny; | Call Number: 004 Woo f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The philosophy of information retrieval evalutaion, Noun phrase translation for cross-language document selection, (LNCS-Lecture Notes in Computer Science 2406), Hal. 355- 370 |
Author: Ellen M. Voohees; | Call Number: 025.04 Eva | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
CLIR system evaluation at the NTCIR workshop, Noun phrase translation for cross-language document selection, (LNCS-Lecture Notes in Computer Science 2406), Hal. 371-388 |
Author: Noriko Kando; | Call Number: 025.04 Eva | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
CLEF methodology and metrics, Noun phrase translation for cross-language document selection, (LNCS-Lecture Notes in Computer Science 2406), Hal. 394-404 |
Author: Martin Brashler; Carol Peters; | Call Number: 025.04 Eva | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptanalysis of the public key cryptosystem based, Efficient key updating signaturn schemes based on IBS, LNCS-Lecture Notes in Computer Science 2898), Hal. 234-244 |
Author: George Petricles; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
What about vulnerability to a fault attack of the miller's algorithm during an identify based protocols, (LNCS-Lecture Notes in Computer Science 5576) Hal. 122-134 |
Author: Nadia El Mrabet; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Key-insulated encryption based key pre-distribution scheme fo WSN, (LNCS-Lecture Notes in Computer Science 5576) Hal. 200-209 |
Author: Weidong Qiu; Yaowei Zhou; Bo Zhu; Yanfei Zheng; Mi Wen; Zheng Gong; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Error control scheme of hybrid ARQ based on majority voting bit by bit, (LNCS-Lecture Notes in Computer Science 5576) Hal. 563-569 |
Author: Hsin-Kun Lai, Chia-Chin Ma, Eri-Huel Lu; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|