Your search for 38749 returns 4879 document(s) |
Design and implementation of an accelerated gabor filter bank using parallel hardware, (LNCS-Lecture Notes in Computer Science 2147) Hal 451-460 |
Author: Nikolaus VoR; Barbel Mertsching; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Mechanism design for preference aggregation over coalitions, (LNCS-Lecture Notes in Computer Science 3709) Hal 852 |
Author: Eric Hsu; Sheila McIlraith; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Design of Parallel processing system for facial image retrieval, (LNCS-Lecture Notes in Computer Science 1557) Hal 592-593 |
Author: Hyung Lee; Kyung-Ae Moon; Jong-Won Park; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Model checking in a microprocessor design project, (LNCS-Lecture Notes in Computer Science 1254) Hal 214-225 |
Author: Geoff Barret; Anthony McIsaac; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A compositional rule for hardware design refinement, (LNCS-Lecture Notes in Computer Science 1254) Hal 24-35 |
Author: K. L. McMillan; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Reasoning about inference in an object-based design method ((LNCS-Lecture Notes in Computer Science 670) Hal. 1-18 |
Author: C.B. Jones; | Call Number: 004. Woo f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Design and synthesis of synchronization skeletons using brancing time temporal logic, (LNCS-Lecture Notes in Computer Science 131) Hal. 52-71 |
Author: Edmund M. Clarke; | Call Number: 004 Lec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Selective regression test for access control systems employing RBCA,(LNCS-Lecture Notes in Computer Science 5576) Hal. 70-79 |
Author: Chao Huang; Jianling Sun; Xinyu Wang; Yuanjie Si; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Attack pattern discovery by frequent episodes mining from honeypot systems, (LNCS-Lecture Notes in Computer Science 5576) Hal. 301-316 |
Author: Ming Yang Su, Kai Chi Chang; Chun-Yuen Lin; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Modelling and evaluating trust relationships in mobile agents based systems, (LNCS-Lecture Notes in Computer Science 2576) Hal 176-190 |
Author: Ching Lin; Vijay Varadharajan; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|