Your search for 38656 returns 2727 document(s) |
PLI: a new framework to protect digital content for P2P networks, (LNCS-Lecture Notes in Computer Science 2576) Hal 206-216 |
Author: Guofei Gu; Bin B. Zhu; Shipeng Li; Shiyong Zhang; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computing and exploiting tree-decompositions for solving constraint networks, (LNCS-Lecture Notes in Computer Science 3709) Hal 777-781 |
Author: Philippe Jegou; Samba Ndojh Ndiaye; Cyril Terrioux; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
And/or search spaces and the semantic width of constraint networks, (LNCS-Lecture Notes in Computer Science 3709) Hal 860 |
Author: Robert Mateescu; Rina Dechter; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Compositional verification of synchronous networks, (LNCS-Lecture Notes in Computer Science 1926) Hal 214-227 |
Author: Leszek Holenderski; | Call Number: 004.33 Jos f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Verifying universal properties of parameterized networks, (LNCS-Lecture Notes in Computer Science 1926) Hal 291-303 |
Author: Kai Baukus; Yassine Lakhnech; Karsten Stahl; | Call Number: 004.33 Jos f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Parametrized verification of linear networks using automata as invariants, (LNCS-Lecture Notes in Computer Science 1254) Hal 412-423 |
Author: A. Prasad Sistla; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Parametrized verification of linear networks using automata as invariants, (LNCS-Lecture Notes in Computer Science 1254)Hal. 412-423 |
Author: A. Prasad Sistia; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
For net: a distributed forensics networks, (LNCS-Lecture Notes in Computer Science 2776), Hal. 1-16 |
Author: Kulesh Shammugasundaram, Nasir Memon; Anubhav Savant, and Herve Bronnimann; | Call Number: 006.33 Sei f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Round optimal distributed key generation of threshold cryptosystem based on discrete logarithm problem, (LNCS-Lecture Notes in Computer Science 2576) Hal 96-110 |
Author: Rui Zhang; Hideki Imai; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Effect of hot spot on the performance of multistage interconnection networks, Hal. 504-505 |
Author: M. Atiquzzaman; | Call Number: SEM-137 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|