Your search for 52998 returns 1666 document(s) |
Message Encryption Using Deceptive Text And Randomized Hashing (673-680) |
Author: Vamsikrishna Yenikapati
B.Poorna Satyanarayana; | Call Number: SEM-323 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Hardware-assisted algorithm for full-text large-dictionary string matching using n-gram hashing, page 443 |
Author: Jonathan D. Cohen | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Multiattribute Hashing using gray codes. (227-238) |
Author: Christos Faloutsos; | Call Number: SEM-360 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A fast and secure encryption algorithm for message communication, HAL. 629- 634 |
Author: Paul A.J.; Varghess Paul, P. Mythili; | Call Number: SEM-289 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Rapid object indexing using locality sensitive hashing and jount 3D-signature space estimation, page 1111 |
Author: B. Matei | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
n-body simulations using message passing parallel computers, Hal. 355-360 |
Author: Annath Y. Grama; Vipin Kumar; Ahmad Sameh; | Call Number: SEM-229 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Scientific and technical text processing using wordstar |
Author: McKeague, Charles F.; | Call Number: 808.066 McK s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Chinese text retrieval without using a directory, Hal. 42-49 |
Author: Aitao Chen; Jianzhang He, Liangje Xu; | Call Number: SEM-249 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Using n-grams for Korean text retrieval, Hal. 216-224 |
Author: Joon Ho Lee an Jeong Soo Ahn; | Call Number: SEM-248 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Authenticated encryption in WSN using eSTREAM ciphers, (LNCS-Lecture Notes in Computer Science 5576) Hal 741-749 |
Author: Shakil Ahmad; Arif Wahla; Firdous Kausar; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|