Search Result Save to File Save as CSV
Your search for 52773 returns 1440 document(s)
Towards an implementation-oriented specification of TP protocol in LOTOS, (LNCS-Lecture Notes in Computer Science 670) Hal 93-109
Author: Ing Widya; Gert-Jan van der Heijden; | Call Number: 004 Woo f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Towards an integration of answer set and constraint solving, (LNCS-Lecture Notes in Computer Science 3668) Hal 52-66
Author: S. Baselice; P.A. Bonatti; M. Gelfond; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Towards implementations for advanced equivalence checking in answer-set programming, (LNCS-Lecture Notes in Computer Science 3668) Hal 189-203
Author: Hans Tompits; Stefan Woltran; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Towards a generalized interaction scheme for information access, LNCS-Lecture Notes in Computer Science 2942), Hal.291-301
Author: Yannis Tzitzikas; Carlo Meghini; Nicolas Spyratos; | Call Number: 006.33 Sei f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Fingerprint synthesis towards constructing an enhanced authentication system using low resolution webcam, Hal. 679-688
Author: islam, Md. Rajibul; Sayeed, Md. Shobel; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Sustainble Bluiding Rating Tool towards Learning Improvement in Malaysia's Higher Institution: A Proposal
Author: Natasha Khalil; Hursul Nizam Husin; | Call Number: SEM-354 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Moving towards pci dss 3.0 compliace: a case study of credit card data security audit in an online pyment company
Author: muhammad r sihab; febrianamisdianti; | Call Number: sem-320 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Towards practical applications: novel embedded near infrared face recognition system, 515-519
Call Number: Changtao Zhou, Dong Yi, Zhiwei Zhang, Stan Z. Li* | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Towards practical applications: novel embedded near infrared face recognition system, 515-519
Author: Changtao Zhou, Dong Yi, Zhiwei Zhang, Stan Z. Li*; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
An Empirical Study of the Characteristics of Access Control Model Towards Secure KMS in Collaborative Environment (hal 1378-1383)
Author: Azreena Abu Bakar, Rusli Abdullah, Nur Izura Udzir, Hamidah Ibrahim; | Call Number: SEM-368 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   14 15 16 17 18 19 20 21 22 23  Next