Search Result Save to File Save as CSV
Your search for 38656 returns 2727 document(s)
PLI: a new framework to protect digital content for P2P networks, (LNCS-Lecture Notes in Computer Science 2576) Hal 206-216
Author: Guofei Gu; Bin B. Zhu; Shipeng Li; Shiyong Zhang; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Computing and exploiting tree-decompositions for solving constraint networks, (LNCS-Lecture Notes in Computer Science 3709) Hal 777-781
Author: Philippe Jegou; Samba Ndojh Ndiaye; Cyril Terrioux; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
And/or search spaces and the semantic width of constraint networks, (LNCS-Lecture Notes in Computer Science 3709) Hal 860
Author: Robert Mateescu; Rina Dechter; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Compositional verification of synchronous networks, (LNCS-Lecture Notes in Computer Science 1926) Hal 214-227
Author: Leszek Holenderski; | Call Number: 004.33 Jos f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Verifying universal properties of parameterized networks, (LNCS-Lecture Notes in Computer Science 1926) Hal 291-303
Author: Kai Baukus; Yassine Lakhnech; Karsten Stahl; | Call Number: 004.33 Jos f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Parametrized verification of linear networks using automata as invariants, (LNCS-Lecture Notes in Computer Science 1254) Hal 412-423
Author: A. Prasad Sistla; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Parametrized verification of linear networks using automata as invariants, (LNCS-Lecture Notes in Computer Science 1254)Hal. 412-423
Author: A. Prasad Sistia; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
For net: a distributed forensics networks, (LNCS-Lecture Notes in Computer Science 2776), Hal. 1-16
Author: Kulesh Shammugasundaram, Nasir Memon; Anubhav Savant, and Herve Bronnimann; | Call Number: 006.33 Sei f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Round optimal distributed key generation of threshold cryptosystem based on discrete logarithm problem, (LNCS-Lecture Notes in Computer Science 2576) Hal 96-110
Author: Rui Zhang; Hideki Imai; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Effect of hot spot on the performance of multistage interconnection networks, Hal. 504-505
Author: M. Atiquzzaman; | Call Number: SEM-137 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next