Your search for 41807 returns 5404 document(s) |
Medical information privacy assurance: cryptographic and system aspects, (LNCS-Lecture Notes in Computer Science 2576) Hal 199-218 |
Author: Giuseppe Ataniese; Reza Curtmola; Breno de Medeiros; Darren Davis; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A temporal programming language for heterogenous information systems, (LNCS-Lecture Notes in Computer Science 3668) Hal 444-445 |
Author: Vitor Noguiera; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Extracting caller information from voicemail, (LNCS-Lecture Notes in Computer Science 2773) Hal 67-77 |
Author: Jing Huang; Geoffrey Zweig; Mukund Padmanabhan; | Call Number: 006.4 Cod i | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Towards a generalized interaction scheme for information access, LNCS-Lecture Notes in Computer Science 2942), Hal.291-301 |
Author: Yannis Tzitzikas; Carlo Meghini; Nicolas Spyratos; | Call Number: 006.33 Sei f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
From Music Information Needs to Music Information Retrieval and Discovery: A Content Analysis of Online Queries For Unknown-Item Music Search (27-34) |
Author: Ming-Hsin Chiu
Chia-Hui Liao; | Call Number: SEM-330 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Natural language information processing : A Computer grammar of english and its applications |
Author: Sager, Naomi; | Call Number: 420.72 Sag r | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
English for computer science |
Author: Mullen, Norma D; | Call Number: 004.425 Mul e | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security evaluation of an infrusion tolerant web service architecture using stochastic activity networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 1-10Hal. 260-269 |
Author: Zahra Aghajani; Mohammad Abdollahi Azgomi; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Detection DDoS attack using dispersible traffic matrix and weighted moving average, (LNCS-Lecture Notes in Computer Science 5576) Hal. 290-300 |
Author: Tae Hwan Kim; Dong Seong Kim; Sang Min Lee; Jong Sou Park; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secure multi-party computation using virtual parties for computation on encrypted data, (LNCS-Lecture Notes in Computer Science 5576) Hal. 412-421 |
Author: Rohit Pathak; Satyadhar Joshi; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|