Your search for 40240 returns 2109 document(s) |
An improved pseudorandom generator based on hardness of factoring, (LNCS-Lecture Notes in Computer Science 2576) Hal 88-101 |
Author: Nenad Dedic; Leonid Reyzin; Salil Vadhan; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A fully digital adaptive power-supply regulator based on improved pulse skip modulation in 90 nm CMOS, 168-173 |
Author: Hangbiao Li, Ping Luo, Qian Xie, Bo Zhang; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Improved Logistic-Sine Chaotic Map based S-box and Bit-Plane Scrambling Encryption Schemes Performance on Compressed ECG Data |
Author: Muhammad Fauzi; Grafika Jati
Muchammad Febrian Rachmadi; | Call Number: Mak T Jilid 071-095 (T-1283) (Mak T-082) | Type: Makalah Tesis
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Study and implementation of an RFID based object-relationship recognition system, 418-422 |
Author: Xiaonan Yu, Tiancheng Zhang, Dejun Yue, Yu Gu, Ge Yu; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Evaluation of dependency parsers for long arabic sentences. ( hal. 243-248 ) |
Author: Maytham Alabbas, Allan Ramsay; | Call Number: SEM-364 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Penilaian risiko dan analisa profil risiko TI menggunakan kerangka kerja riskit: studi kasus PT. Bank ABC (Persero) Tbk |
Author: Yok Christiyono; | Call Number: KA-195 (Softcopy KA-194) | Edition: 2011 | Type: Karya Akhir (KA)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Perancangan Manajemen Risiko Pada PT.XYZ Dengan Menggunakan Metode NIST 800-30 |
Author: Vinicio Vasquera Silitonga; | Call Number: KA-256 (Softcopy KA-255) | Edition: 2012 | Type: Karya Akhir (KA)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Risk assessment in software-as-a-service company: a case study XYZ |
Author: Nulad Wisnu Pambudi; | Call Number: KA-886 (softcopi KA-884) MAK KA-543 | Edition: 2016 | Type: Karya Akhir (KA)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Modified version of the K-Means algorithm with a distance based on cluster symmetry, page 674 |
Author: M-C Su | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer based attack on RSA algorithm and its future credibility, HAL. 635-638 |
Author: Dinesh Dhawan, Swami Sarvanand; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|