Search Result Save to File Save as CSV
Your search for 54018 returns 451 document(s)
Combining constraint solving and symbolic model checking for a class of systems with non-linear constraints, (LNCS-Lecture Notes in Computer Science 1254) Hal 316-327
Author: William Chan; Richard Anderson; Paul Beame; David Notkin; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Combining constraint solving and symbolic model checking for a class of sysems with non-linear constraints, (LNCS-Lecture Notes in Computer Science 1254)Hal. 316-327
Author: William Chan; Richard Anderson; Paul Beanne; David Notkin; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Pengenalan wajah 3D dengan gambar berkualitas rendah dengan menggunakan metode kernel linear discriminant analysis (kernel non-parameter) (Proposal Hibah Penelitian Mahasiswa Program Doktor)
Author: Arief Fatchul Huda | Call Number: PRO-HIBAH PENELITIAN MAHASISWA PROGRAM DOKTOR-2009-002 | Type: Proposal Research (Khusus Dose
Find Similar |  Add To Favorites |  Detail in New Window 
Implementasi Sistem Monitoring dan telecommand untuk Sistem Managemen Energi (EMS) di PENS-ITS (46-48)
Author: Yahya Chusna Arif Suryono; | Call Number: SEM-247 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Encryption advances to meet internet challeges, page 20
Author: David Clark | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Broadcast encryption's bright future, page 57
Author: Jeffrey L. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
RAPID ENCRYPTION ALGORITHM :SOLUSI KEAMANAN VIDEO CONFERENCE
Author: Khilif Faiz Ma'ruf, MoracH. , Zaenal S.; | Call Number: SEM-341 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A trusted PKI architecture based on fingerprint encryption, 336-340
Author: Jiangming Cui, Xiaojun Zhang, Nan Su, Zongsheng Lai; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
SAN data encryption system on iSCSI, 506-509
Author: Xu Xuedong/s, Sun Wei/s, Li Muyuan/s; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Foundations of coding: compression encryption error correction
Author: Dumas, Jean-Guillaume; | Call Number: 003.54 Dum f | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next