Your search for 38699 returns 2664 document(s) |
Algorithms-structured computer arrays and networks: architectures and processors for images percepts, models, information/ Leonard Uhr |
Author: Uhr, Leonard; | Call Number: 004.35 Uhr a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Multiprocessor operating system |
Author: Joseph, M.; | Call Number: 005.43 Jos m | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The art of multiprocessor programming |
Author: Herlihy, Maurice; | Call Number: 005.434 Her a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Back to our beginning: information utilization bertram brooks and the fundamental equation of information science, page 851 |
Author: Ross J. Todd | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
CAVEAT: technique and tool for computer aided verification and transformation, (LNCS-Lecture Notes in Computer Science 939) Hal 70-83 |
Author: E. Pascal Gribomont; Didier Rossetto; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The dark side of timed opacity,(LNCS-Lecture Notes in Computer Science 5576) Hal. 21-30 |
Author: Frank Cassez; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Certificateless signature scheme without random oracles,(LNCS-Lecture Notes in Computer Science 5576) Hal. 31-40 |
Author: Vineela Muppavarapu ad Soon M. Chung; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Grouping provenance information to improve efficiency of access control, (LNCS-Lecture Notes in Computer Science 5576) Hal. 51-59 |
Author: Amril Syalim; Yoshiaki; Konichi Sakurai; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Tagging the turtle: local attestation for kiosk computing, (LNCS-Lecture Notes in Computer Science 5576) Hal. 60-69 |
Author: Ronald Toegl; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Selective regression test for access control systems employing RBCA,(LNCS-Lecture Notes in Computer Science 5576) Hal. 70-79 |
Author: Chao Huang; Jianling Sun; Xinyu Wang; Yuanjie Si; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|