Search Result Save to File Save as CSV
Your search for 48078 returns 4578 document(s)
Analysis of recovery in database system using a write-ahead log protocol (hal 175 - 184)
Author: Anant Jhingran, Pratap Khedkar; | Call Number: SEM - 359 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
ARIES/IM: An efficient and high concurrency index management method using write-ahead logging (hal 371 - 382)
Author: C.Mohan , Frank Levine; | Call Number: SEM - 359 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Formal analysis of an authentication protocol for UMTS ( Universal Mobile Telecommunications System) using avispa/ Ilham W. Kurnia; L. Yohanes Stefanus; Ari Saptawijaya
Author: Kurnia, Ilham W.; Stefanus, L. Yohanes; Saptawijaya, Ari | Call Number: Pub Staf.JN-0006 | Type: Jurnal Nasional
Find Similar |  Add To Favorites |  Detail in New Window 
Implementasi real-time change data cappture untuk learning analytics menggunakan write ahead logging dan distributed processing
Author: Favian Kharisma Hazman; | Call Number: SK-1934 (Softcopy SK-1416 | Edition: Denny | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Formal analysis of an authentication protocol for UMTS (Universal Mobile Telecommunications systems) Using AVISPA
Author: Ilham W. Kurnia; L. Yohanes Stefanus; Ari Saptawijaya | Call Number: Jurnal Ilmu Komputer dan Informasi (JIKI) Vol. 1 No. 2 Juni 2008 | Type: UI-ana Indek Artikel
Find Similar |  Add To Favorites |  Detail in New Window 
User accounting system of centralized computer networks using RADIUS protocol (hal 457 - 462)
Author: Heru Nurwarsito, Raden Arief Setyawan, Handoko D Fatikno; | Call Number: SEM - 362 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Efficient and Secure Routing Protocol for Wireless Sensor Networks using Mine Detection (An Extension of Triple Umpiring System for WSN) (141-145)
Author: Ganesh Subramanian Dr.R.Amutha; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Optimizing rijndeal cipher using selected variants of GF arithmetic operators ( hal 170 - 175)
Author: Petrus Mursanto; | Call Number: SEM - 362 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Quantitative system performance computer system analysis using queueing network models
Author: Lazowska, Edward D.; | Call Number: 621.381 9 Laz q | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Perfonmance Analysis of Using a Reliable Transport Layer Protocol for Transmitting EAP Message Ofer RADIUS in Inter-Domain WLAN Roaming (G1-G5)
Author: Hadi Syafruddin Arini Syopiansyah Jaya Putra; | Call Number: SEM-384 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next