Your search for 38663 returns 3899 document(s) |
Using the web information structures for retrieving web pages, (LNCS-Lecture Notes in Computer Science 4022), Hal. 892-897 |
Author: Mirna Adriani and Rama Pandugita; | Call Number: 025.004 Acc | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Using feedback to improve masquerade detection, (LNCS-Lecture Notes in Computer Science 2846)Hal. 48-62 |
Author: Kwong H. Yung; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Multifunctional turbo-based receiver using partial unit memory codes, (LNCS-Lecture Notes in Computer Science 2898), Hal. 24-34 |
Author: Lina Pagoonee and Bahran Honary; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Improved fast correlation attack using low rate codes, (LNCS-Lecture Notes in Computer Science 2898), Hal. 67-81 |
Author: Havard Molland; Jaohn Erik Mathinasen, Tor Helleseth; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Remote user authentication using public information, LNCS-Lecture Notes in Computer Science 2898), Hal. 360-369 |
Author: Chris J. Mitchell; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
HPF and numerical libraries, (LNCS-Lecture Notes in Computer Science 1557) Hal 140-152 |
Author: Harald J. Ehold; Wilfried N. Gansterer; Dieter F. Kvasnicka; Christoph W. Ueberhuber; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security evaluation of an infrusion tolerant web service architecture using stochastic activity networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 1-10Hal. 260-269 |
Author: Zahra Aghajani; Mohammad Abdollahi Azgomi; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Detection DDoS attack using dispersible traffic matrix and weighted moving average, (LNCS-Lecture Notes in Computer Science 5576) Hal. 290-300 |
Author: Tae Hwan Kim; Dong Seong Kim; Sang Min Lee; Jong Sou Park; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secure multi-party computation using virtual parties for computation on encrypted data, (LNCS-Lecture Notes in Computer Science 5576) Hal. 412-421 |
Author: Rohit Pathak; Satyadhar Joshi; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Energy lesser broadcasting algorithms using adjustable transmission ranges in mobile ad hoc networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 502-511 |
Author: Toshihiko Sasama; Yashiro Abe; Hiroshi Masuyama; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|