Your search for 40567 returns 4306 document(s) |
Automatic building of new field associatin word candidates using search engine, page 951 |
Author: El-Sayed Atlan | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Development of a text mining based search engine prototype using HTML parser, HAL. 265-270 |
Author: Marcories; Richard Kumaradjaja; | Call Number: SEM-289 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Search engine application using fuzzy relation method for E-journal of informatics department petra christian university ( hal 39 - 44 ) |
Author: Leo Wilyanto Santoso , Rolly Intan, Prayogo Probo Susanto; | Call Number: SEM - 362 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Heuristic And Ai Approach To Optimize Plagiarism Detection Tool Using A Public Search Engine (399-403) |
Author: Ondrej Vesely
Jan Kolomaznik
Tomas Foltynek; | Call Number: SEM-329 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Using OCSP to secure certificate-using transactions in m-commerce, (LNCS-Lecture Notes in Computer Science 2576) Hal 280-292 |
Author: Jose L. Munoz; Jordi Forne; Oscar Esparza; Bernabe Miguel Soriano; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Run-time performance optimization of an FPGA-based deduction engine for SAT solvers, (LNCS-Lecture Notes in Computer Science 2147) Hal 315-325 |
Author: Andreas Dandalis; Viktor K. Prasanna; Bharani Thiruvengadam; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Fine-grain access control using shibboleth for the storage resource broker,(LNCS-Lecture Notes in Computer Science 5576) Hal. 41-50 |
Author: Vineela Muppavarapu; Soon M. Chung; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Attention : attackER traceback using MAC layer abnormalilty detection, (LNCS-Lecture Notes in Computer Science 5576) Hal. 239-249 |
Author: Yongjin Kim; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Authenticated encryption in WSN using eSTREAM ciphers, (LNCS-Lecture Notes in Computer Science 5576) Hal 741-749 |
Author: Shakil Ahmad; Arif Wahla; Firdous Kausar; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A study on mosaic based CCTV system using localization, (LNCS-Lecture Notes in Computer Science 5576) Hal 814-822 |
Author: Jong-Min Kim; Myung-A Kang; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|