Search Result Save to File Save as CSV
Your search for 38576 returns 3895 document(s)
Shallow morphological analysis in monolingual information retrieval for Dutch, German, and Italian, (LNCS-Lecture Notes in Computer Science 2406), Hal. 262-277
Author: Christof Monz; Maaten de Rijke; | Call Number: 025.04 Eva | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Analysis of double block lengt hash function, LNCS-Lecture Notes in Computer Science 2898), Hal. 289-305
Author: Mitauhiro Hattori, Shoichi Hirose, and Susumu Yoshida; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
On performance of kernel based and embedded real-time operating systems: benchmarking and analysis, Hal. 401-406
Author: Mastura D. Marieska, Paul G. Hariyanto, M. Firda Fauzan, Achmad Imam Kistijantoro; | Call Number: SEM-301 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Analysis of denial-of service attack resistance using a real-time model checker, 159-163
Author: Tatsuya ARAI, Shin-ya NISHIZAKI; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Analysis of MODIS Data Compression Methods for Near Real-Time Operasional Service (89-93)
Author: Dodi Sudiana Adhitya Widyaningrum; | Call Number: SEM-297 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Intelligent real time criminal identification in video surveillance using fuzzy similarity measure (Proposal Toray Science Foundation)
Author: M. Rahmat Widyanto | Call Number: PRO-INDONESIA TORAY SCIENCE FOUNDATION-2007-001 | Type: Proposal Research (Khusus Dose
Find Similar |  Add To Favorites |  Detail in New Window 
Performance analysis of digital secure voice transmission over HF radio channel, (LNCS-Lecture Notes in Computer Science 5576) Hal. 337-346
Author: Kihong Kim; Jinkeun Hong; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A comparative analysis of HC-128 and rabbit encryption schemes for pervasive computing in WSN environment, (LNCS-Lecture Notes in Computer Science 5576) Hal 682-691
Author: Firdous Kausar; Ayesha Naureen; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A comparative analysis of PKC and semi-PKC based key management schemes for hierarchical sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 692-701
Author: Ayesha Naureen; Attiya Akram; Rabia Riaz; Ki-Hyung Kim; H. Farooq Ahmed; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Performance analysis and derived parallelization strategy for a SCF program at the hartree fock level, (LNCS-Lecture Notes in Computer Science 1557) Hal 163-172
Author: Siegfried Hofinger; Othmar Steinhauser; Peter Zinterhof; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   4 5 6 7 8 9 10 11 12 13  Next