Search Result Save to File Save as CSV
Your search for 38804 returns 5394 document(s)
Bayesian approach based comment spam defending tool, (LNCS-Lecture Notes in Computer Science 5576) Hal. 578-587
Author: Beatrice cynthia Dhinakaran; Dhinaharan Nagamalai; Jac-Kwang Lee; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A mathematical approach towards trust based security in pervasive computing environment, (LNCS-Lecture Notes in Computer Science 5576) Hal 702-711
Author: Naima Iltaf; Mukhtar Hussain; Farrukh Kamran; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Hardware-software partitioning: a reconfigurable and evolutionary computing approach, (LNCS-Lecture Notes in Computer Science 2147) Hal 595-600
Author: Jim Harkin; Thomas M. McGinnity; Liam P. Maguire; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
An approach to real-time visualization of PIV method with FPGA, and applications and applications (LNCS-Lecture Notes in Computer Science 2147) Hal 601-606
Author: Tsutomu maruyama; Yoshiki Yamaguchi; Atsushi Kawase; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A reconfigurable approach to packet filtering,(LNCS-Lecture Notes in Computer Science 2147) Hal 638-642
Author: Raymond Sinnappan; Scott Hazelhurst; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
The split-proxy approach: a new architecture for parallel video servers, (LNCS-Lecture Notes in Computer Science 1557) Hal 327-336
Author: Giuseppe De Pietro; Marco Lerro; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
An automata-theoretic approach to fair realizability and synthesis, (LNCS-Lecture Notes in Computer Science 939) Hal 267-278
Author: Moshe Y. Vardi; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Trace table based approach for pipelined microprocessor verfication, (LNCS-Lecture Notes in Computer Science 1254), Hal. 364-375
Author: Jun Sawada and Warren A. Hunt Jr.; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A New approach to malware detection, (LNCS-Lecture Notes in Computer Science 5576) Hal. 229-238
Author: Hongying Tang; Bo Zhu; Kui Ren; | Call Number: 005.3 Adv | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
The industrial take-up of formal methods in safety-critical and other areas: a perspective, (LNCS-Lecture Notes in Computer Science 670) Hal 183-195
Author: Jonathan Bowen; Victoria Stavridou; | Call Number: 004 Woo f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   4 5 6 7 8 9 10 11 12 13  Next