Search Result Save to File Save as CSV
Your search for 47998 returns 43 document(s)
Panduan bagi orang sibuk: word perfect 6.1 for windows/Sonny Walla
Author: Walla, Sonny; | Call Number: 652.553 6 Wal p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Order-preserving minimal perfect hash funcations and information retrieval, page 281
Author: Edward A Fox | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
A Faster algorithm for constructing minimal perfect hash function, Hal. 266-273
Author: Edward A. Fox; Qi Fan Chen; Lenwood S. Heath; | Call Number: SEM-254 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A Dynamic Perfect Hash Function Defined by an Extended Hash Indicator Table (245-254)
Author: W.P. Yang M.W. Du; | Call Number: SEM-346 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A Computationally-efficient construction for the matrix-based key distribution in sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 190-199
Author: Abeldelaziz Mohaisen; Nam-Su Jho; Dowon Hong; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A multidimensional digital hashing scheme for files whit composite keys (214-235)
Author: Ekow J. Otoo; | Call Number: SEM-357 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Message Encryption Using Deceptive Text And Randomized Hashing (673-680)
Author: Vamsikrishna Yenikapati B.Poorna Satyanarayana; | Call Number: SEM-323 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Memory management during run generation in external sorting, Hal. 472-483
Author: Per-Ake Larson; Goetz Graete; | Call Number: SEM-244 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
External Knowledge and Information Technology: Implications for Process Innovation Performance, Page 287-300
Author: Konstantinos Trantopoulos, Georg von Krogh, Martin W. Wallin, and Martin Woerter | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
On ideal non-perfect secret sharing schemes, (LNCS-Lecture Notes in Computer Science 1361) Hal 207-216
Author: Pascal Paillier; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5  Next