Search Result
Save to File
Your search for
39690
returns
3601
document(s)
Mental poker revisited, LNCS-Lecture Notes in Computer Science 2898), Hal. 370-383
Author: Adam Barnett and Nigel P. Smart; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Modeling serious games based on cognitive skill classificatin using learning vector quantization with petri net, Hal. 159-164
Author: Moh. Aries Syufagi; Mauridhi Hery P.; Mochamad Hariadi; | Call Number: SEM-301 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Deadlock Analysis of Client/Server Programs (484-495)
Author: J. Zhou K. Tai; | Call Number: SEM-287 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Model checking
Author: Clarke, Edmund M.; | Call Number: 004.21 Cla m | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Net Is coming
Author: Bertrand Meyer | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Dynamic scheduling on a network heterogenous computer system, (LNCS-Lecture Notes in Computer Science 1557) Hal 584-585
Author: Janez Brest; Viljem Zumer; Milan Ojstersek; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
CAVEAT: technique and tool for computer aided verification and transformation, (LNCS-Lecture Notes in Computer Science 939) Hal 70-83
Author: E. Pascal Gribomont; Didier Rossetto; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
The dark side of timed opacity,(LNCS-Lecture Notes in Computer Science 5576) Hal. 21-30
Author: Frank Cassez; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Certificateless signature scheme without random oracles,(LNCS-Lecture Notes in Computer Science 5576) Hal. 31-40
Author: Vineela Muppavarapu ad Soon M. Chung; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Grouping provenance information to improve efficiency of access control, (LNCS-Lecture Notes in Computer Science 5576) Hal. 51-59
Author: Amril Syalim; Yoshiaki; Konichi Sakurai; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
16
17
18
19
20
21
22
23
24
25
Next