Search Result Save to File Save as CSV
Your search for 38400 returns 3017 document(s)
Parallel tree algorithms for N-body simulations, (LNCS-Lecture Notes in Computer Science 1557) Hal 579-580
Author: Vincenzo Antonuccio-Delogu; Ugo Becciani; Mario Gambera; Antonio Pagliaro; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Parallel numerical algorithms for distributed memory machines, (LNCS-Lecture Notes in Computer Science 1557) Hal 581-583
Author: Pierre Bassomo; Ibrahima Sakho; Annie Corbel; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Efficient parallel algorithms for dense cholesky factorization, (LNCS-Lecture Notes in Computer Science 1557) Hal 600-602
Author: Eunice E. Santos; Pei-Yue Pauline Chu; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Verifying safety properties of a class of infinite-state distributed algorithms, (LNCS-Lecture Notes in Computer Science 939) Hal 42-53
Author: Bengt Jonsson; Lars Kempe; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Hybridization of genetic algorithms and constraint propagation for the BACP, ((LNCS-Lecture Notes in Computer Science 3668) Hal 421-423
Author: Tony Lambert; Carlos Castro; Eric Monfroy; Maria Christina Riff; Frederic Saubion; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
On the correctness of scurity proofs for the 3GPP confidentiality and integrity algorithms, LNCS-Lecture Notes in Computer Science 2898), Hal. 206-318
Author: Testsu Iwata and Kaoru Kurosawa; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Symbolic support graph: a space efficient data structure for incremental tabled evaluation, (LNCS-Lecture Notes in Computer Science 3668) Hal 235-249
Author: Diptikalyan Saha; C.R. Ramakrishnan; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Performance evaluation of Cost effective routing for packet transmissions in mobile ad hoc network, (LNCS-Lecture Notes in Computer Science 5576) Hal. 494-501
Author: Kentaro Kishida, Toshihiko Sasama; Hiroshi Masuyama; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Planning complex updates to satisfy constraint rules using a constraint logic search engine (LNCS-Lecture Notes in Computer Science 985)
Author: Suzanne M. Embury, Peter M.D. Gray; | Call Number: 004 Rul | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Does it need trusted third party? design of buyyer-seller watermarking protocol without trusted third party, (LNCS-Lecture Notes in Computer Science 2576) Hal 265-279
Author: Jae-Gwi Choi; Kouichi Sakurai; Ji-Hwan Park; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next