Search Result Save to File Save as CSV
Your search for 38912 returns 3874 document(s)
Hoare's logic incomplete when it does not have to be, (LNCS-Lecture Notes in Computer Science 131) Hal. 9-23
Author: J. Bergstra; | Call Number: 004 Lec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Using OCSP to secure certificate-using transactions in m-commerce, (LNCS-Lecture Notes in Computer Science 2576) Hal 280-292
Author: Jose L. Munoz; Jordi Forne; Oscar Esparza; Bernabe Miguel Soriano; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Formal verification of digital systems, from ASICs to HW/SW codesign - a pragmatic approach, (LNCS-Lecture Notes in Computer Science 3709) Hal 3-6
Author: Roger B. Hughes; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Hardware and software aspects for 3-D wavelet decomposition on shared memory MIMD computers, (LNCS-Lecture Notes in Computer Science 1557) Hal 347-356
Author: Rade Kutil; Andreas Uhl; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Fine-grain access control using shibboleth for the storage resource broker,(LNCS-Lecture Notes in Computer Science 5576) Hal. 41-50
Author: Vineela Muppavarapu; Soon M. Chung; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Attention : attackER traceback using MAC layer abnormalilty detection, (LNCS-Lecture Notes in Computer Science 5576) Hal. 239-249
Author: Yongjin Kim; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Authenticated encryption in WSN using eSTREAM ciphers, (LNCS-Lecture Notes in Computer Science 5576) Hal 741-749
Author: Shakil Ahmad; Arif Wahla; Firdous Kausar; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A study on mosaic based CCTV system using localization, (LNCS-Lecture Notes in Computer Science 5576) Hal 814-822
Author: Jong-Min Kim; Myung-A Kang; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
An efficient tree-based group key agreement using bilinear map, (LNCS-Lecture Notes in Computer Science 2576) Hal 357-371
Author: Sangwon Lee; Yongdae Kim; Kwangjo Kim; Dae-Hyun Ryu; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Gigahertz reconfigurable computing using sige HBT bicmos fpgas, (LNCS-Lecture Notes in Computer Science 2147) Hal 59-69
Author: Bryan S. Goda; Russell P. Kraft; Steven R. Carlough; Thomas W. Krawczyk Jr.; John F.McDonald; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   5 6 7 8 9 10 11 12 13 14  Next