Search Result Save to File Save as CSV
Your search for 53760 returns 3413 document(s)
Cloud computing model and implementation of molecular dynamics simulation using amber and gromacs, 31-36
Author: Ari Wibisono, Heru Suhartanto; | Call Number: SEM 304 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Symbolic model checking of infinite state systems using presburger arithmetic, (LNCS-Lecture Notes in Computer Science 1254) Hal 400-411
Author: Tevfik Bultan; Richard Gerber; William Pugh; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Efficient model checking using tabled resolution,(LNCS-Lecture Notes in Computer Science 1254) Hal 143-154
Author: Y.S. Ramakrishna; C.R. Ramakhrisnan; I.V. Ramakrishnan; Scott A. Smolka; Terrance Swift; David S. Warren; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Symbolic model checking of infinite state systems using presbuger; arithmetic, (LNCS-Lecture Notes in Computer Science 1254)Hal. 400-411
Author: Tevfik Bultan; Richard Gerber and William Pugh; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Propagation model verification using elementary environment spesific method for analyzing 802. 16e system coverage in Bandung city. hal, 15
Author: Andito Dwi Pratomo, Legijono, Denny Sukarman, Hadi Hariyanto; | Call Number: SEM-317 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A type-2 fuzzy control traffic policing mechanism schemes model over high speed network using backpressure technique, 1-5
Author: Somchai Lekcharoen; | Call Number: SEM-349 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A network security policy framework using multi-attribute decision making model, 116-120
Author: Song Yu, He Xiaoli, Ye Xiaotong, Liang Jinming, He Xianbo; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Analysis of denial-of service attack resistance using a real-time model checker, 159-163
Author: Tatsuya ARAI, Shin-ya NISHIZAKI; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Performance evaluation of generic image classification algorithm using sparse bayesian model, 453-457
Author: Lei Chen, Qijun Chen; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Smart government assesment using scottish smart city maturity model : A case study of depok city (hal. 99-104)
Author: Muhammad Akmal Juniawan, Puspa Sandhayudhita, Betty Purwandari, Satrio Baskoro Yudhoatmojo, Made Ayu Aristyana Dewi; | Call Number: SEM- 372 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   8 9 10 11 12 13 14 15 16 17  Next