Your search for 38379 returns 3216 document(s) |
Parallelizing union-find in constraint handling rules using confluence analysis, (LNCS-Lecture Notes in Computer Science 3668) Hal 113-127 |
Author: Thom Fruhwirth; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Nondeterminism analysis of functional logic programs, (LNCS-Lecture Notes in Computer Science 3668) Hal 265-279 |
Author: Bernd Brarel; Michael Hanus; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Polynomial interpretations as a basis for termination analysis of logic programs, (LNCS-Lecture Notes in Computer Science 3668) Hal 311-325 |
Author: Manh Thang Nguyen; Danny De Schreye; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A generic framework for the analysis and specialization of logic programs, ( (LNCS-Lecture Notes in Computer Science 3668) Hal 407-409 |
Author: German Puebla; Elvira Albert; Manuel Hermenegildo; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Shallow morphological analysis in monolingual information retrieval for Dutch, German, and Italian, (LNCS-Lecture Notes in Computer Science 2406), Hal. 262-277 |
Author: Christof Monz; Maaten de Rijke; | Call Number: 025.04 Eva | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Analysis of double block lengt hash function, LNCS-Lecture Notes in Computer Science 2898), Hal. 289-305 |
Author: Mitauhiro Hattori, Shoichi Hirose, and Susumu Yoshida; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Performance analysis of digital secure voice transmission over HF radio channel, (LNCS-Lecture Notes in Computer Science 5576) Hal. 337-346 |
Author: Kihong Kim; Jinkeun Hong; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A comparative analysis of HC-128 and rabbit encryption schemes for pervasive computing in WSN environment, (LNCS-Lecture Notes in Computer Science 5576) Hal 682-691 |
Author: Firdous Kausar; Ayesha Naureen; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A comparative analysis of PKC and semi-PKC based key management schemes for hierarchical sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 692-701 |
Author: Ayesha Naureen; Attiya Akram; Rabia Riaz; Ki-Hyung Kim; H. Farooq Ahmed; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Performance analysis and derived parallelization strategy for a SCF program at the hartree fock level, (LNCS-Lecture Notes in Computer Science 1557) Hal 163-172 |
Author: Siegfried Hofinger; Othmar Steinhauser; Peter Zinterhof; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|