Search Result Save to File Save as CSV
Your search for 50643 returns 3979 document(s)
SAN data encryption system on iSCSI, 506-509
Author: Xu Xuedong/s, Sun Wei/s, Li Muyuan/s; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
General Survey on Massive Data Encryption (150-155)
Author: Mengmeng Wang Guiliang Zhu Xiaoqiang Zhang; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
The Effects of state-based and event-based data representation on user performance in query formulation tasks, page 269-290
Author: Gove N. Allen and Salvatore T. March | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
An Optimized Lumped Element Improved Performance Hybrid Directional Couplers (489-494)
Author: Mazhar B. Tayel Hani S. Alhakami; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A comparative analysis of HC-128 and rabbit encryption schemes for pervasive computing in WSN environment, (LNCS-Lecture Notes in Computer Science 5576) Hal 682-691
Author: Firdous Kausar; Ayesha Naureen; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Bootstrapped Multinominal Logistic Regression on Apnea Detection Using ECG Data (181-186)
Author: Hadaiq R Sanabila Mohamad Ivan Fanany Wisnu Jatmiko Aniati Murni Arimurthy; | Call Number: SEM-297 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Improved data structures for fully dynamic biconnectivity,Hal 686-695
Author: Monika Rauch; | Call Number: SEM-202 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Full disk encryption based on virtual machineb and ken recovery scheme, 217-222
Author: Min Liang, Jiang-ke Xu; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Image Encryption Technology based on Chaos Theory (V1-632 -- V1-635)
Author: WANG Xiaoman CHU Ying LIU Peng HAN Zhiqiang JING QI WANG Xing LV RuiHua JIANG Xin; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Map data processing/ Herbert Freeman; Goffredo G. Pieroni
Author: Freeman, Herbert; | Call Number: 526 Map | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next