Your search for 51860 returns 1850 document(s) |
Alternatif pengamanan fisik terhadap strong room dengan menggunakan sescet sharing scheme dengan sum labeling sebagai representasi access structure-nya, Hal. 323-326 |
Author: Arie Setya Dewi; Danang Jaya; Rahmi Rusin; | Call Number: SEM-276 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Dampak penggunaan community access point (telecenter) sampai tingkat pedesaan di Jawa TImur, Hal. 1.1-1.5 |
Author: Asianti Oetojo; | Call Number: SEM-272 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Teknologi unlicensed mobile access (UMA), untuk rural next generation network (R-NGN), Hal. 323-328 |
Author: Arinuddin Umar; | Call Number: SEM-271 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Design of an OPAC database to permit different subject searching access in a multi-discliplines University Library Catalogue database, Hal. 245-255 |
Author: Maristella Agost; Maurizio Masotti; | Call Number: SEM-254 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Lower bounds for union-split-find related problems on random access machines,Hal 625-634 |
Author: Peter Bro Miltersen; | Call Number: SEM-202 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Fine-grain access control using shibboleth for the storage resource broker,(LNCS-Lecture Notes in Computer Science 5576) Hal. 41-50 |
Author: Vineela Muppavarapu; Soon M. Chung; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Selective regression test for access control systems employing RBCA,(LNCS-Lecture Notes in Computer Science 5576) Hal. 70-79 |
Author: Chao Huang; Jianling Sun; Xinyu Wang; Yuanjie Si; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secret sharing schemes on access structures with intersection number equal to one (LNCS-Lecture Notes in Computer Science 2576) 354 |
Author: Jaume Marti-Farre; Carles Padro; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Development of university of indonesia next generation fire wall prototype and access control with deep packet inspection |
Author: Harish Muhammad Nazief; Tonny Adhi Sabastian; alfan presekal; Gladhi Guarddin; | Call Number: sem-320 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Effective memory access optimization by memory delay modeling, memory allocation, and slack time management, 207-211 |
Author: Sultan Daud Khan, Mohammad Saqib, Saleh Basalamah; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|