Your search for 38400 returns 3017 document(s) |
Parallel tree algorithms for N-body simulations, (LNCS-Lecture Notes in Computer Science 1557) Hal 579-580 |
Author: Vincenzo Antonuccio-Delogu; Ugo Becciani; Mario Gambera; Antonio Pagliaro; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Parallel numerical algorithms for distributed memory machines, (LNCS-Lecture Notes in Computer Science 1557) Hal 581-583 |
Author: Pierre Bassomo; Ibrahima Sakho; Annie Corbel; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Efficient parallel algorithms for dense cholesky factorization, (LNCS-Lecture Notes in Computer Science 1557) Hal 600-602 |
Author: Eunice E. Santos; Pei-Yue Pauline Chu; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Verifying safety properties of a class of infinite-state distributed algorithms, (LNCS-Lecture Notes in Computer Science 939) Hal 42-53 |
Author: Bengt Jonsson; Lars Kempe; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Hybridization of genetic algorithms and constraint propagation for the BACP, ((LNCS-Lecture Notes in Computer Science 3668) Hal 421-423 |
Author: Tony Lambert; Carlos Castro; Eric Monfroy; Maria Christina Riff; Frederic Saubion; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On the correctness of scurity proofs for the 3GPP confidentiality and integrity algorithms, LNCS-Lecture Notes in Computer Science 2898), Hal. 206-318 |
Author: Testsu Iwata and Kaoru Kurosawa; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Symbolic support graph: a space efficient data structure for incremental tabled evaluation, (LNCS-Lecture Notes in Computer Science 3668) Hal 235-249 |
Author: Diptikalyan Saha; C.R. Ramakrishnan; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Performance evaluation of Cost effective routing for packet transmissions in mobile ad hoc network, (LNCS-Lecture Notes in Computer Science 5576) Hal. 494-501 |
Author: Kentaro Kishida, Toshihiko Sasama; Hiroshi Masuyama; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Planning complex updates to satisfy constraint rules using a constraint logic search engine (LNCS-Lecture Notes in Computer Science 985) |
Author: Suzanne M. Embury, Peter M.D. Gray; | Call Number: 004 Rul | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Does it need trusted third party? design of buyyer-seller watermarking protocol without trusted third party, (LNCS-Lecture Notes in Computer Science 2576) Hal 265-279 |
Author: Jae-Gwi Choi; Kouichi Sakurai; Ji-Hwan Park; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|