Search Result
Save to File
Your search for
53089
returns
2047
document(s)
Iterative support vector machines dan Fuzzy clustering berbasis kernel nonparametrik
Author: Zuherman Rustam; | Call Number: Ringdis-011 | Type: Ringkasan Disertasi
Find Similar
|
Add To Favorites
|
Detail in New Window
Rule-based translation of relational Queries into iterative programs(206-214)
Author: Johann Christoph Freytag; | Call Number: SEM-360 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Iterative support vector machines dan Fuzzy clustering berbasis kernel nonparametrik
Author: Zuherman Rustam; | Call Number: DIS-011 | Type: Disertasi
Find Similar
|
Add To Favorites
|
Detail in New Window
On the security of two threshold signature schemes with traceable signers, (LNCS-Lecture Notes in Computer Science 2576) Hal 111-122
Author: Guilin Wang; Xiaoxi Han; Bo Zhu; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Proxy and threshold one-time signatures, (LNCS-Lecture Notes in Computer Science 2576) Hal 123-136
Author: Mohamed Al-Ibrahim; Anton Cerny; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
A threshold GQ signature scheme, (LNCS-Lecture Notes in Computer Science 2576) Hal 137-150
Author: Li-Shan Liu; Cheng-Kang Chu; Wen-Guey Tzeng; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Threshold and bounded-delay voting in critical control systems, ((LNCS-Lecture Notes in Computer Science 1926) Hal 70-81
Author: Paul Caspi; Rym Salem; | Call Number: 004.33 Jos f | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
On signature schemes with threshold verification detecting malicious verifiers, (LNCS-Lecture Notes in Computer Science 1361) Hal 67-78
Author: Holger Petersen; Markus Michels; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Threshold key-recovery systems for RSA, (LNCS-Lecture Notes in Computer Science 1361) Hal 191-200
Author: Tatsuaki Okamoto; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
A time-threshold-based preemption scheme for vertical handoff in cellular/WLAN interworking, 178-181
Author: Jialin Cai; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
11
12
13
14
15
16
17
18
19
20
Next