Search Result Save to File Save as CSV
Your search for 45250 returns 545 document(s)
A method of detecting stack overflow vulnerability of binary code of a component, 212-216
Author: Hang Zhengbo, Yang Hebiao, Da Wei; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A Texture-based method for modeling the background and detecting moving objects, page 657
Author: M. Heikkila | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Perlindungan hak cipta data informasi geospasial dengan menggunakan binary code
Author: Nachnoer Nuklir Radariawan Arss; | Call Number: T-993 (Softcopy T-702) Source code T-146 | Edition: 2012 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
g-binary: A New Non-parameterized Code for Improved Interved File Compression (464-473)
Author: Ilias Nitsos Georgios Evangelidis Dimitrios Dervos; | Call Number: SEM-381 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Steal this code: create reusable software component for windows 95 and windows NT
Author: Williams, Al; | Call Number: 005.265 Wil s | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Steal this code: create reusable software component for windows 95 and windows NT
Author: Williams, Al; | Call Number: 005.265 Wil s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Integrating the QMR method with first principles material science application code, Hal. 213-218
Author: N.M. Nachtigal; W.A. Shilton; G.M. Stocks; D.M.C. Nicholson; Y. Wang; | Call Number: SEM-229 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
On the covering radius of second order binary reed-muller code in set of resilliet boolean functions, (LNCS-Lecture Notes in Computer Science 2898), Hal. 82-92
Author: Yuri Borissov; An Braeken; Svetla Nikova; and Preneel; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Web Vulnerability Assessment: Outsoure Dilemmas
Author: Arniyati Ahmad , Siti Rohaidah Ahmad , Nor Fatimah Awang , Zulkarnian Md. Ali; | Call Number: SEM-368 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Solaris binary compatibility guide
Call Number: 005.43 Sol | Type: Buku Manual
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next