Search Result Save to File Save as CSV
Your search for 40240 returns 2109 document(s)
An improved pseudorandom generator based on hardness of factoring, (LNCS-Lecture Notes in Computer Science 2576) Hal 88-101
Author: Nenad Dedic; Leonid Reyzin; Salil Vadhan; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A fully digital adaptive power-supply regulator based on improved pulse skip modulation in 90 nm CMOS, 168-173
Author: Hangbiao Li, Ping Luo, Qian Xie, Bo Zhang; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Improved Logistic-Sine Chaotic Map based S-box and Bit-Plane Scrambling Encryption Schemes Performance on Compressed ECG Data
Author: Muhammad Fauzi; Grafika Jati Muchammad Febrian Rachmadi; | Call Number: Mak T Jilid 071-095 (T-1283) (Mak T-082) | Type: Makalah Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Study and implementation of an RFID based object-relationship recognition system, 418-422
Author: Xiaonan Yu, Tiancheng Zhang, Dejun Yue, Yu Gu, Ge Yu; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Evaluation of dependency parsers for long arabic sentences. ( hal. 243-248 )
Author: Maytham Alabbas, Allan Ramsay; | Call Number: SEM-364 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Penilaian risiko dan analisa profil risiko TI menggunakan kerangka kerja riskit: studi kasus PT. Bank ABC (Persero) Tbk
Author: Yok Christiyono; | Call Number: KA-195 (Softcopy KA-194) | Edition: 2011 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Perancangan Manajemen Risiko Pada PT.XYZ Dengan Menggunakan Metode NIST 800-30
Author: Vinicio Vasquera Silitonga; | Call Number: KA-256 (Softcopy KA-255) | Edition: 2012 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Risk assessment in software-as-a-service company: a case study XYZ
Author: Nulad Wisnu Pambudi; | Call Number: KA-886 (softcopi KA-884) MAK KA-543 | Edition: 2016 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
A Modified version of the K-Means algorithm with a distance based on cluster symmetry, page 674
Author: M-C Su | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Computer based attack on RSA algorithm and its future credibility, HAL. 635-638
Author: Dinesh Dhawan, Swami Sarvanand; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   5 6 7 8 9 10 11 12 13 14  Next