Search Result | Save to File |
Your search for 40337 returns 1922 document(s) |
A Xor based public auditing scheme for proof-of -storage |
Author: Changsheng Wan; Juan Zhang; | Call Number: Sem-302 | Type: Indeks Artikel prosiding/Sem |
Find Similar | Add To Favorites | Detail in New Window |
An improved packet marking IP traceback scheme, Hal. 3142-3144 |
Author: Qian-qian Zhang; Peng SUN; Qing Wu; Wenna Wang; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem |
Find Similar | Add To Favorites | Detail in New Window |
A Scheme for effective execution of irregular doacross loops, Hal. II.285-II.292 |
Author: Ding-Kai Chen; Pen Chung Yew; | Call Number: SEM-155 | Type: Indeks Artikel prosiding/Sem |
Find Similar | Add To Favorites | Detail in New Window |
An efficient scheme for providing high availability (hal 236 - 245 ) |
Author: Anupam Bhide, Ambuj Goyal , Hui-i Hsiao, Anant Jhingran; | Call Number: SEM - 359 | Type: Indeks Artikel prosiding/Sem |
Find Similar | Add To Favorites | Detail in New Window |
A Multi-Tool Scheme For Summarizing Textual Documents (409-414) |
Author: Rafael Duire Lins Steven J. Simske Luciano de Souza Cabral Gabriel de Franca Silva Rinaldo Lima Rafael F. Mello Luciano Favaro; | Call Number: SEM-329 | Type: Indeks Artikel prosiding/Sem |
Find Similar | Add To Favorites | Detail in New Window |
An ECG 12-Lead Hardware with SPIHT Compressing Scheme (167-172) |
Author: Eka Puji Widiyanto Sani M.Isa M. Iqbal Tawakal M. Nanda Kurniawan Wisnu JAtmiko Petrus Mursanto; | Call Number: SEM-319 | Type: Indeks Artikel prosiding/Sem |
Find Similar | Add To Favorites | Detail in New Window |
A Static Pessimistic Scheme for Handling Replicated Databases (389-398) |
Author: Jian Tang N. Natarajan; | Call Number: SEM-228 | Type: Indeks Artikel prosiding/Sem |
Find Similar | Add To Favorites | Detail in New Window |
An Efficient Cache Maintenance Scheme for Mobile Environment (530-537) |
Author: A. Kahol S. Khurana S. Gupta P. Srimani; | Call Number: SEM-287 | Type: Indeks Artikel prosiding/Sem |
Find Similar | Add To Favorites | Detail in New Window |
Implementation of Shao's Proxy Signature Scheme on Pdf Files |
Author: Muhammad Zakiy Saputra; | Call Number: SK-2289 (Softcopy SK-1771) Source Code-835 | Edition: Amril Syalim | Type: Skripsi |
Find Similar | Add To Favorites | Detail in New Window |
A ring signature scheme based on the nyberg-rueppel signature scheme, (LNCS-Lecture Notes in Computer Science 2576) Hal 169-175 |
Author: Chong-zhi Gao; Zheng-an Yao; Lei Li; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS |
Find Similar | Add To Favorites | Detail in New Window |
Prev 9 10 11 12 13 14 15 16 17 18 Next |