Your search for 42166 returns 4279 document(s) |
Hardware-software partitioning: a reconfigurable and evolutionary computing approach, (LNCS-Lecture Notes in Computer Science 2147) Hal 595-600 |
Author: Jim Harkin; Thomas M. McGinnity; Liam P. Maguire; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computing and exploiting tree-decompositions for solving constraint networks, (LNCS-Lecture Notes in Computer Science 3709) Hal 777-781 |
Author: Philippe Jegou; Samba Ndojh Ndiaye; Cyril Terrioux; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Teraflops computing: a challenge to parallel numerics? (LNCS-Lecture Notes in Computer Science 1926) Hal 1-12 |
Author: Friedel Hossfeld; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Parallel cluster computing with IEEE1394-1995, (LNCS-Lecture Notes in Computer Science 1557) Hal 522-532 |
Author: Laszlo Boszormenyi; Gunther Holzl; Emanuel Pirker; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An evaluation of parallel computing in PC clusters with fast ethernet, (LNCS-Lecture Notes in Computer Science 1557) Hal 570-571 |
Author: Manuel Acacio; Oscar Canovas; Jose M. Garcia; Pedro E. Lopez-de-Truel; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
TNO at CLEF 2001: computing translation resources, LNCS-Lecture Notes in Computer Science 2406), Hal. 78-93 |
Author: Wessel Kraaij; | Call Number: 025.04 Eva | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptanalysis of secure key exchange protocol between STB and smart card in IPTV broadcasting, (LNCS-Lecture Notes in Computer Science 5576) Hal 797-803 |
Author: Song-Hee Lee; Nam-Sup Park; Soo Kyun Kim; Jin-Young Choi; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults, (LNCS-Lecture Notes in Computer Science 1361) Hal 115-124 |
Author: F. Bao; R.H. Deng; Y. Hang; A. Jeng; A. D. Narasimhalu; T. Ngair; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Open key exchange: how to defeat dictionary attacks without encrypting public keys, (LNCS-Lecture Notes in Computer Science 939) Hal 79-90 |
Author: Stefan Lucks; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Detection DDoS attack using dispersible traffic matrix and weighted moving average, (LNCS-Lecture Notes in Computer Science 5576) Hal. 290-300 |
Author: Tae Hwan Kim; Dong Seong Kim; Sang Min Lee; Jong Sou Park; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|