Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 10134 dokumen yang sesuai dengan query
cover
"This volume constitutes the refereed proceedings of the 5th International Conference on Contemporary Computing, IC3 2010, held in Noida, India, in August 2011. The 42 revised full papers presented together with 7 short papers were carefully reviewed and selected from 162 submissions. The papers are organized in topical sections on, algorithm, applications, systems (hardware and software), biomedical informations, and poster papers."
Berlin: Springer-Verlag, 2012
e20410410
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the International Conference Eco-friendly Computing and Communication Systems, ICECCS 2012, held in Kochi, Kerala, India, in August 2012. The 50 revised full papers presented were carefully reviewed and selected from 133 submissions. The papers are organized in topical sections on energy efficient software system and applications, wireless communication systems, green energy technologies, image and signal processing, bioinformatics and emerging technologies, secure and reliable systems, mathematical modeling and scientific computing, pervasive computing and applications."
Berlin: Springer-Verlag, 2012
e20410116
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the 6th International Conference on Information Processing, ICIP 2012, held in Bangalore, India, in August 2012. The 75 revised full papers presented were carefully reviewed and selected from 380 submissions. The papers are organized in topical sections on wireless networks, image processing, pattern recognition and classification, computer architecture and distributed computing, software engineering, information technology and optimization techniques, data mining techniques, and computer networks and network security.
"
Berlin: Springer, 2012
e20406446
eBooks  Universitas Indonesia Library
cover
Vasil Khachidze, editor
"This book constitutes the proceedings of the International Conference on E-business and Strategy, iCETS 2012, held in Tianjin, China, in August 2012. The 65 revised full papers presented were carefully reviewed and selected from 231 submissions. The papers feature contemporary research on developments in the fields of e-business technology, information management systems, and business strategy. Topics addressed are latest development on e-business technology, computer science and software engineering for e-business, e-business and e-commerce applications, social networking and social engineering for e-business, e-business strategic management and economics development, e-business education, entrepreneurship and e-learning, digital economy strategy, as well as internet and e-commerce policy."
Berlin : Springer-Verlag, 2012
e20408411
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the 10th International Conference on Wired / Wireless Internet Communications, WWIC, held in Santorini island, Greece during June 6-8, 2012. The 23 revised full papers and 6 short papers presented were carefully reviewed and selected from 50 submissions. The papers are organized in six thematically-distinct technical sessions, covering the following major topics: virtual networks and clouds, multimedia systems, wireless sensor networks and localization, delay-tolerant and opportunistic networks, handover techniques and channel access, and ad hoc networks."
Berlin: Springer-Verlag, 2012
e20409183
eBooks  Universitas Indonesia Library
cover
Magnus Bang, editor
"This book constitutes the proceedings of the 7th International Conference on Persuasive Technology, PERSUASIVE 2012, held in Linköping, Sweden, in June 2012. The 21 full papers presented together with 5 short papers were carefully reviewed and selected from numerous submissions. In addition three keynote papers are included in this volume. The papers cover the typical fields of persuasive technology, such as health, safety and education."
Berlin: [, Springer-Verlag], 2012
e20410464
eBooks  Universitas Indonesia Library
cover
Arry Yanuar
"Rem GTPase is a member ofRGK subfamily (Rad, Rem, Rem2, Gem and Kir) found recently. Rem is highly expressed at cardiac muscle.[l] Crystal structure of Rem (2NZJ) unveiled disordered structures of switch I (residue 102-110) and switch II (residue 135-145). These both regions have been acknowledged to be involved in nucleotide binding and GTP hydrolysis . The purpose of this study is to construct Rem GTPase model by using homology modeling method and to analyze the movements of Rem by performing molecular dynamics (MD) simulation. The selected Rem model, model_Rem_6.pdb, was constructed from multiple templates composed of 421P _A (Ras), 2A78_A (RalA), and 2NZJ_A. Furthermore Rem model was used for ten nanoseconds MD simulation provided for GDP, GTP and without ligand system by using GROMACS 3.3.2. The result was observed from visualization point of view, potential energy, RMSD and RMSF factors. MD simulation revealed that switch regions moved more flexible than other regions in the structure and tended to move away from nucleotide binding site, distinct from the movements of Ras switches which had shown interactions occurred within y­phosphate and both switches."
2010
MK-Pdf
UI - Makalah dan Kertas Kerja  Universitas Indonesia Library
cover
"This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS 2012, held in Montreal, Canada, in August 2012. The 11 full papers presented in this volume were carefully reviewed and selected from 46 submissions. In addition 11 papers were selected for the workshop track, abstracts of 7 of these contributions are also included in this book. Topics of interest ar, physical layer security, multiparty computations, codes, lattices and cryptography, authentication codes, randomness extraction, cryptography from noisy channels, wiretap channels, bounded-storage models, information-theoretic reductions, quantum cryptography, quantum information theory, nonlocality and nonsignaling, key and message rates, secret sharing, physical models and assumptions, network coding security, adversarial channel models, information-theoretic tools in computational settings, implementation challenges, and biometric security."
Berlin: Springer-Verlag , 2012
e20410080
eBooks  Universitas Indonesia Library
cover
"This book constitutes the thoroughly refereed proceedings of the Third International Conference on Interactive Theorem Proving, ITP 2012, held in Princeton, NJ, USA, in August 2012. The 21 revised full papers presented together with 4 rough diamond papers, 3 invited talks, and one invited tutorial were carefully reviewed and selected from 40 submissions. Among the topics covered are formalization of mathematics, program abstraction and logics, data structures and synthesis, security, (non) termination and automata, program verification, theorem prover development, reasoning about program execution, and prover infrastructure and modeling styles."
Berlin: Springer-Verlag, 2012
e20410089
eBooks  Universitas Indonesia Library
cover
Gonzalo Navarro, editor
"This book constitutes the proceedings of the 5th International Conference on Similarity Search and Applications, SISAP 2012, held in Toronto, Canada, in August 2012. The 14 full papers presented in this volume, together with 2 demo papers and 2 invited talks, were carefully reviewed and selected from 19 submissions. The papers deal with many of the most relevant aspects of similarity searching and are organized in topical sections named, new scenarios and approaches, improving metric data structures, facing scalability issues, searching in specific spaces, and new similarity spaces."
Berlin: [Springer-Verlag, ], 2012
e20410111
eBooks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>