Search Result Save to File Save as CSV
Your search for 45239 returns 3917 document(s)
Using a link metric to improve communication mechanism and real-time properties in an adaptive middleware for heterogeneous sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 422-431
Author: Edison Pignaton de Freitas; Tales Heimfarth; Marco Aurelio Wehrmeister...[et.al]; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Demonstrating real-time JPEG image compression-decompression using standard component IP cores on a programmable logic based platform for DSP and image processing, (LNCS-Lecture Notes in Computer Science 2147) Hal 441-450
Author: Albert Simpson; Jill Hunter; Moira Wylie; Yi Hu; David Mann; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Threat Risk Analysis for Cloud Security based on Attack-Defense Trees (106-111)
Author: Ping Wang Wen-Hui Lin Pu-Tsun Kuo Hui-Tang Lin Tzu Chia Wang; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Fast active appearance model search using canonical analysis, page 1690
Author: R. Donner | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Topic analysis using a finite mixture model, page 521
Author: Hang Li | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Crosstalk Analysis of Parallel Microstrip Line Using 4-Port Scattering Model
Author: Indar Surahmat , Sugihartono , Achmad Munir; | Call Number: SEM-368 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Analysis of Resistance Capability and equivalent floor live-load of steel frame in fire (V2-445--V2-448)
Author: Yu-lai Han Bai-tao Sun Zhen-Qing Wang Mu Qiao; | Call Number: SEM-328 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Cybercrime Deterrence and International Legislation: Evidence from Distributed Denial of Service Attacks, Page 497-523
Author: Kai-Lun Hui, Seung Hyun Kim, and Qiu-Hong Wang | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Metode deteksi dan mitigasi serangan distributed denial-of-service (DDOS) secara dinamis dan terdistribusi pada jaringan openflow
Author: Arisyi Ihsan Fadilah; | Call Number: T-1108 (Softcopy T-817) Source code T-224 | Edition: 2015 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Metode deteksi serangan distributed denial of service menggunakan flow traffic dan algoritma self organizing map
Author: Ahmad Sanmorino; | Call Number: T-1010 (Softcopy T-719) Source code T-161 | Edition: 2013 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   2 3 4 5 6 7 8 9 10 11  Next