Your search for 47998 returns 43 document(s) |
Panduan bagi orang sibuk: word perfect 6.1 for windows/Sonny Walla |
Author: Walla, Sonny; | Call Number: 652.553 6 Wal p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Order-preserving minimal perfect hash funcations and information retrieval, page 281 |
Author: Edward A Fox | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Faster algorithm for constructing minimal perfect hash function, Hal. 266-273 |
Author: Edward A. Fox; Qi Fan Chen; Lenwood S. Heath; | Call Number: SEM-254 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Dynamic Perfect Hash Function Defined by an Extended Hash Indicator Table (245-254) |
Author: W.P. Yang
M.W. Du; | Call Number: SEM-346 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Computationally-efficient construction for the matrix-based key distribution in sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 190-199 |
Author: Abeldelaziz Mohaisen; Nam-Su Jho; Dowon Hong; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A multidimensional digital hashing scheme for files whit composite keys (214-235) |
Author: Ekow J. Otoo; | Call Number: SEM-357 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Message Encryption Using Deceptive Text And Randomized Hashing (673-680) |
Author: Vamsikrishna Yenikapati
B.Poorna Satyanarayana; | Call Number: SEM-323 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Memory management during run generation in external sorting, Hal. 472-483 |
Author: Per-Ake Larson; Goetz Graete; | Call Number: SEM-244 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
External Knowledge and Information Technology: Implications for Process Innovation Performance, Page 287-300 |
Author: Konstantinos Trantopoulos, Georg von Krogh, Martin W. Wallin, and Martin Woerter | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On ideal non-perfect secret sharing schemes, (LNCS-Lecture Notes in Computer Science 1361) Hal 207-216 |
Author: Pascal Paillier; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|