Your search for 38912 returns 3860 document(s) |
Case Study of integration of reconfigurable logic as a coprocessor into a SCI-cluster under RT-linux, (LNCS-Lecture Notes in Computer Science 2147) Hal 633-637 |
Author: Thomas Lehmann; Andreas Schreckenberg; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Relating high-level and low-level action descriptions in a logic of actions and change, (LNCS-Lecture Notes in Computer Science 1201) Hal 3-17 |
Author: Erik Sandewall; | Call Number: 004.33 Mal h | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Some connections between iterative programs, recursive programs, and first-order logic, (LNCS-Lecture Notes in Computer Science 131) Hal. 150-166 |
Author: A.J. Kfoury; | Call Number: 004 Lec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
on Updates of logic programs: a properties-based approach, The relative complexity of updates for a class of database views, LNCS-Lecture Notes in Computer Science 2942) Hal.231-251 |
Author: Mauricio Osorio and Fernando Zacarias; | Call Number: 006.33 Sei f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Toupie = u-calculus + constraints, (LNCS-Lecture Notes in Computer Science 939) Hal 114-126 |
Author: Antoine Rauzy; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Simulation of second order random waves,Hal 208-218 |
Author: H.Tuah; | Call Number: SEM-200 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security evaluation of an infrusion tolerant web service architecture using stochastic activity networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 1-10Hal. 260-269 |
Author: Zahra Aghajani; Mohammad Abdollahi Azgomi; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Detection DDoS attack using dispersible traffic matrix and weighted moving average, (LNCS-Lecture Notes in Computer Science 5576) Hal. 290-300 |
Author: Tae Hwan Kim; Dong Seong Kim; Sang Min Lee; Jong Sou Park; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secure multi-party computation using virtual parties for computation on encrypted data, (LNCS-Lecture Notes in Computer Science 5576) Hal. 412-421 |
Author: Rohit Pathak; Satyadhar Joshi; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Energy lesser broadcasting algorithms using adjustable transmission ranges in mobile ad hoc networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 502-511 |
Author: Toshihiko Sasama; Yashiro Abe; Hiroshi Masuyama; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|