Search Result Save to File Save as CSV
Your search for 40737 returns 206 document(s)
A Gradual approach to a more trustworthy, yet scalable, proof-carrying code, Hal. 47-62
Author: Robert R. Schneck; George C. Necula; | Call Number: SEM-281 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
The parallel performance of groundwater flow code on the cray T3D, Hal. 131-136
Author: S.F. Ashby; R.D. Falgout; S.G. Smith; A.F.B. Tompson; | Call Number: SEM-229 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Integrating the QMR method with first principles material science application code, Hal. 213-218
Author: N.M. Nachtigal; W.A. Shilton; G.M. Stocks; D.M.C. Nicholson; Y. Wang; | Call Number: SEM-229 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A method of detecting stack overflow vulnerability of binary code of a component, 212-216
Author: Hang Zhengbo, Yang Hebiao, Da Wei; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A memory improvement on decoding of the (41, 21, 9) quadratic residue code, 361-365
Author: Hung-Peng Lee, Hsin-Chiu Chang; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Development of a reliable GUI for DiaHDL: A Web-Based VHDL Code Generator
Author: Anita Ratna Dewi Susanti, Wildan Thoyib, Thomas Schumann; | Call Number: SEM-368 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Deteksi code smell kode progam dalam representasi ast dengan pendekatan by rules ( hal. E-23/E-28 )
Author: Hanson Prpihantoro Putro,Inggriani Liem; | Call Number: SEM-366 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Steal this code: create reusable software component for windows 95 and windows NT
Author: Williams, Al; | Call Number: 005.265 Wil s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Trojans, Worms, and spyware: a computer security professional's guide to malicious code
Author: Erbschloe, Michael; | Call Number: 005.84 Erb t | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Practical Algorithms for Image Analysis: Description, Examples, and Code + 1Cd
Author: Seul, Michael; | Call Number: 621.367 Seu p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   6 7 8 9 10 11 12 13 14 15  Next