Your search for 53156 returns 511 document(s) |
Professional web services security |
Call Number: 005.8 Pro | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Corporate computer and network security |
Author: Panko, Raymond; | Call Number: 005.8 Pan c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Content awareness in a file system interface: implementing the "Pile" metaphor for organizing information, Hal. 260-269 |
Author: Daniel E. Rose; Richard Mander; Tim Oren; | Call Number: SEM-255 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Implementing a hidden markov model speech recognition system in programmable logic, (LNCS-Lecture Notes in Computer Science 2147) Hal 81-90 |
Author: Stephen J. Melnikoff; Steven F.Quigley; Martin J. Russell; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A study on implementing packet filtering firewall with cisco ip acces control list, 278-286 |
Author: Iman Sutoyo, Mochamad Wahyudi; | Call Number: SEM-348 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Novel Approach for Implementing of A Log-Sigmoid Function on A FPGA Device Using The sfloat24 Math Library (13) |
Author: M.C. Miglionico
F. Parillo; | Call Number: SEM-311 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Burst Tries: A Fast, Efficient Data Structure for String Keys, page 192-223 |
Author: S. Heinz, [et all] | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Efficient Creativity: Constraint-Guided Conceptual Combination, page 299-349 |
Author: Fintan J. Costello | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Efficient Mining of Both Positive and Negative Association Rules, page 381-405 |
Author: X. Wu, [et all] | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
MPEG-2 Sources: Exploiting Source Scability for an Efficient Bandwidth Allocation, page 240-255 |
Author: A. Chimienti, [et all] | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|