Search Result Save to File Save as CSV
Your search for 52998 returns 1666 document(s)
Message Encryption Using Deceptive Text And Randomized Hashing (673-680)
Author: Vamsikrishna Yenikapati B.Poorna Satyanarayana; | Call Number: SEM-323 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Hardware-assisted algorithm for full-text large-dictionary string matching using n-gram hashing, page 443
Author: Jonathan D. Cohen | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Multiattribute Hashing using gray codes. (227-238)
Author: Christos Faloutsos; | Call Number: SEM-360 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A fast and secure encryption algorithm for message communication, HAL. 629- 634
Author: Paul A.J.; Varghess Paul, P. Mythili; | Call Number: SEM-289 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Rapid object indexing using locality sensitive hashing and jount 3D-signature space estimation, page 1111
Author: B. Matei | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
n-body simulations using message passing parallel computers, Hal. 355-360
Author: Annath Y. Grama; Vipin Kumar; Ahmad Sameh; | Call Number: SEM-229 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Scientific and technical text processing using wordstar
Author: McKeague, Charles F.; | Call Number: 808.066 McK s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Chinese text retrieval without using a directory, Hal. 42-49
Author: Aitao Chen; Jianzhang He, Liangje Xu; | Call Number: SEM-249 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Using n-grams for Korean text retrieval, Hal. 216-224
Author: Joon Ho Lee an Jeong Soo Ahn; | Call Number: SEM-248 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Authenticated encryption in WSN using eSTREAM ciphers, (LNCS-Lecture Notes in Computer Science 5576) Hal 741-749
Author: Shakil Ahmad; Arif Wahla; Firdous Kausar; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next