Search Result
Save to File
Your search for
40567
returns
4306
document(s)
Formalizing the XML Schema Matching Problem as a Constraint (333-342)
Author: Marko Smiljanic Maurice van Keulen Willem Jonker; | Call Number: SEM-375 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Constraint-Based Query Optimization for Spatial Databases (181-191)
Author: Richard Helm Kim Marriott Martin Odersky; | Call Number: SEM-350 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
The Effect of Nogood Learning in Distributed Constraint Satisfaction (169-179)
Author: M. Yakoo K. Hirayama; | Call Number: SEM-287 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Case Study of integration of reconfigurable logic as a coprocessor into a SCI-cluster under RT-linux, (LNCS-Lecture Notes in Computer Science 2147) Hal 633-637
Author: Thomas Lehmann; Andreas Schreckenberg; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Relating high-level and low-level action descriptions in a logic of actions and change, (LNCS-Lecture Notes in Computer Science 1201) Hal 3-17
Author: Erik Sandewall; | Call Number: 004.33 Mal h | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Some connections between iterative programs, recursive programs, and first-order logic, (LNCS-Lecture Notes in Computer Science 131) Hal. 150-166
Author: A.J. Kfoury; | Call Number: 004 Lec | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Database Repairing Using Updates, page 722-768
Author: J. Wijsen | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Security evaluation of an infrusion tolerant web service architecture using stochastic activity networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 1-10Hal. 260-269
Author: Zahra Aghajani; Mohammad Abdollahi Azgomi; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Detection DDoS attack using dispersible traffic matrix and weighted moving average, (LNCS-Lecture Notes in Computer Science 5576) Hal. 290-300
Author: Tae Hwan Kim; Dong Seong Kim; Sang Min Lee; Jong Sou Park; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Secure multi-party computation using virtual parties for computation on encrypted data, (LNCS-Lecture Notes in Computer Science 5576) Hal. 412-421
Author: Rohit Pathak; Satyadhar Joshi; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
13
14
15
16
17
18
19
20
21
22
Next