Search Result Save to File Save as CSV
Your search for 42166 returns 4251 document(s)
Demonstrating real-time JPEG image compression-decompression using standard component IP cores on a programmable logic based platform for DSP and image processing, (LNCS-Lecture Notes in Computer Science 2147) Hal 441-450
Author: Albert Simpson; Jill Hunter; Moira Wylie; Yi Hu; David Mann; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Compositional and inductive semantic definitions in fixpoint, equational, constraint, closure-condition, rule-based and game-theoretic form, (LNCS-Lecture Notes in Computer Science 939) Hal 293-308
Author: Patrick Cousot; Radhia Cousot; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Dynamic scheduling on a network heterogenous computer system, (LNCS-Lecture Notes in Computer Science 1557) Hal 584-585
Author: Janez Brest; Viljem Zumer; Milan Ojstersek; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
CAVEAT: technique and tool for computer aided verification and transformation, (LNCS-Lecture Notes in Computer Science 939) Hal 70-83
Author: E. Pascal Gribomont; Didier Rossetto; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
The dark side of timed opacity,(LNCS-Lecture Notes in Computer Science 5576) Hal. 21-30
Author: Frank Cassez; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Certificateless signature scheme without random oracles,(LNCS-Lecture Notes in Computer Science 5576) Hal. 31-40
Author: Vineela Muppavarapu ad Soon M. Chung; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Fine-grain access control using shibboleth for the storage resource broker,(LNCS-Lecture Notes in Computer Science 5576) Hal. 41-50
Author: Vineela Muppavarapu; Soon M. Chung; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Grouping provenance information to improve efficiency of access control, (LNCS-Lecture Notes in Computer Science 5576) Hal. 51-59
Author: Amril Syalim; Yoshiaki; Konichi Sakurai; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Selective regression test for access control systems employing RBCA,(LNCS-Lecture Notes in Computer Science 5576) Hal. 70-79
Author: Chao Huang; Jianling Sun; Xinyu Wang; Yuanjie Si; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Formal verification for access control in web information sharing system, (LNCS-Lecture Notes in Computer Science 5576) Hal. 80-89
Author: Akihiro Sakai; Yoshiaki Hori; Kouichi Sakurai; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   18 19 20 21 22 23 24 25 26 27  Next