Your search for 38409 returns 2596 document(s) |
DDDLIB: a library for solving quantified difference inequalitas, Hal. 129-138 |
Author: Jesper B. Moller; | Call Number: SEM-281 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Dynamic scheduling on a network heterogenous computer system, (LNCS-Lecture Notes in Computer Science 1557) Hal 584-585 |
Author: Janez Brest; Viljem Zumer; Milan Ojstersek; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
CAVEAT: technique and tool for computer aided verification and transformation, (LNCS-Lecture Notes in Computer Science 939) Hal 70-83 |
Author: E. Pascal Gribomont; Didier Rossetto; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer methods for architects |
Author: Reynolds, R.A.; | Call Number: 721.028 Rey c | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer methods and programs .. |
Call Number: [20 (1985): 1-3, 22 (1986): 1-3, 23 (1987): 1-3, 49 (1996): 2-3] | Type: Jurnal/ Majalah
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The dark side of timed opacity,(LNCS-Lecture Notes in Computer Science 5576) Hal. 21-30 |
Author: Frank Cassez; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Certificateless signature scheme without random oracles,(LNCS-Lecture Notes in Computer Science 5576) Hal. 31-40 |
Author: Vineela Muppavarapu ad Soon M. Chung; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Fine-grain access control using shibboleth for the storage resource broker,(LNCS-Lecture Notes in Computer Science 5576) Hal. 41-50 |
Author: Vineela Muppavarapu; Soon M. Chung; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Grouping provenance information to improve efficiency of access control, (LNCS-Lecture Notes in Computer Science 5576) Hal. 51-59 |
Author: Amril Syalim; Yoshiaki; Konichi Sakurai; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Tagging the turtle: local attestation for kiosk computing, (LNCS-Lecture Notes in Computer Science 5576) Hal. 60-69 |
Author: Ronald Toegl; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|