Search Result Save to File Save as CSV
Your search for 38310 returns 4249 document(s)
Coordination of many agents, (LNCS-Lecture Notes in Computer Science 3668) Hal 98-112
Author: Joxan Jaffar; Roland H.C.Yap; Kenny Q. Zhu; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A type system for CHR,( (LNCS-Lecture Notes in Computer Science 3668) Hal 402-403
Author: Emmanuel Coquery; Francois Fages; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Application of composition development method for definition of SYNTHESIS information resource query language semantics, (LNCS-Lecture Notes in Computer Science 670) Hal 428-441
Author: Leonid Kalinichenko; Nikolaj Nikitchenko; Vladimir Zadorozhny; | Call Number: 004 Woo f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
The philosophy of information retrieval evalutaion, Noun phrase translation for cross-language document selection, (LNCS-Lecture Notes in Computer Science 2406), Hal. 355- 370
Author: Ellen M. Voohees; | Call Number: 025.04 Eva | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
CLIR system evaluation at the NTCIR workshop, Noun phrase translation for cross-language document selection, (LNCS-Lecture Notes in Computer Science 2406), Hal. 371-388
Author: Noriko Kando; | Call Number: 025.04 Eva | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
CLEF methodology and metrics, Noun phrase translation for cross-language document selection, (LNCS-Lecture Notes in Computer Science 2406), Hal. 394-404
Author: Martin Brashler; Carol Peters; | Call Number: 025.04 Eva | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptanalysis of the public key cryptosystem based, Efficient key updating signaturn schemes based on IBS, LNCS-Lecture Notes in Computer Science 2898), Hal. 234-244
Author: George Petricles; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
What about vulnerability to a fault attack of the miller's algorithm during an identify based protocols, (LNCS-Lecture Notes in Computer Science 5576) Hal. 122-134
Author: Nadia El Mrabet; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Key-insulated encryption based key pre-distribution scheme fo WSN, (LNCS-Lecture Notes in Computer Science 5576) Hal. 200-209
Author: Weidong Qiu; Yaowei Zhou; Bo Zhu; Yanfei Zheng; Mi Wen; Zheng Gong; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Error control scheme of hybrid ARQ based on majority voting bit by bit, (LNCS-Lecture Notes in Computer Science 5576) Hal. 563-569
Author: Hsin-Kun Lai, Chia-Chin Ma, Eri-Huel Lu; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   9 10 11 12 13 14 15 16 17 18  Next