Search Result Save to File Save as CSV
Your search for 51860 returns 1850 document(s)
Alternatif pengamanan fisik terhadap strong room dengan menggunakan sescet sharing scheme dengan sum labeling sebagai representasi access structure-nya, Hal. 323-326
Author: Arie Setya Dewi; Danang Jaya; Rahmi Rusin; | Call Number: SEM-276 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Dampak penggunaan community access point (telecenter) sampai tingkat pedesaan di Jawa TImur, Hal. 1.1-1.5
Author: Asianti Oetojo; | Call Number: SEM-272 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Teknologi unlicensed mobile access (UMA), untuk rural next generation network (R-NGN), Hal. 323-328
Author: Arinuddin Umar; | Call Number: SEM-271 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Design of an OPAC database to permit different subject searching access in a multi-discliplines University Library Catalogue database, Hal. 245-255
Author: Maristella Agost; Maurizio Masotti; | Call Number: SEM-254 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Lower bounds for union-split-find related problems on random access machines,Hal 625-634
Author: Peter Bro Miltersen; | Call Number: SEM-202 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Fine-grain access control using shibboleth for the storage resource broker,(LNCS-Lecture Notes in Computer Science 5576) Hal. 41-50
Author: Vineela Muppavarapu; Soon M. Chung; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Selective regression test for access control systems employing RBCA,(LNCS-Lecture Notes in Computer Science 5576) Hal. 70-79
Author: Chao Huang; Jianling Sun; Xinyu Wang; Yuanjie Si; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Secret sharing schemes on access structures with intersection number equal to one (LNCS-Lecture Notes in Computer Science 2576) 354
Author: Jaume Marti-Farre; Carles Padro; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Development of university of indonesia next generation fire wall prototype and access control with deep packet inspection
Author: Harish Muhammad Nazief; Tonny Adhi Sabastian; alfan presekal; Gladhi Guarddin; | Call Number: sem-320 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Effective memory access optimization by memory delay modeling, memory allocation, and slack time management, 207-211
Author: Sultan Daud Khan, Mohammad Saqib, Saleh Basalamah; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   12 13 14 15 16 17 18 19 20 21  Next