Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Test file

View through CrossRef
Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.
MZB Standard Enterprise
Title: Test file
Description:
Test file.
Test file.
Test file.
Test file.
Test file.
Test file.
Test file.
Test file.
Test file.
Test file.
Test file.
Test file.
Test file.
Test file.
Test file.
Test file.
Test file.
Test file.
Test file.
Test file.
Test file.
Test file.
Test file.
Test file.
Test file.
Test file.
Test file.
Test file.
Test file.
Test file.

Related Results

Creating Secure File Systems in Open-Source Operating Systems
Creating Secure File Systems in Open-Source Operating Systems
The relevance of this study is determined by insecure data storage on personal computers, as it is the main operating system that performs authentication and file access control. B...
Perancangan Aplikasi Kompresi File MP3 Dengan Menggunakan Algoritma Lempel Ziv Welch (LZW)
Perancangan Aplikasi Kompresi File MP3 Dengan Menggunakan Algoritma Lempel Ziv Welch (LZW)
File berbentuk suara  banyak digunakan dalam kegiatan sehari-hari orang dalam mendukung aktifitasnya seperti penggunaan file suara dalam aplikasi pemutar musik baik secara daring m...
File system metadata virtualization
File system metadata virtualization
The advance of computing systems has brought new ways to use and access the stored data that push the architecture of traditional file systems to its limits, making them inadequate...
Forced pirates and the ethics of digital film
Forced pirates and the ethics of digital film
PurposeWith the rise of the internet, the act of sharing copyrighted material has received a lot of attention, culminating in a flood of lawsuits against file‐sharers as well as st...
A New Secure Chip File Access Method Based on Security Level Information
A New Secure Chip File Access Method Based on Security Level Information
This paper analyzes the shortcomings of two commonly used secure chip file access methods and proposes a new secure chip file access method based on security level information. The...
PENERAPAN ALGORITMA INTERPOLATIVE CODING UNTUK KOMPRESI FILE AUDIO
PENERAPAN ALGORITMA INTERPOLATIVE CODING UNTUK KOMPRESI FILE AUDIO
The size of the audio file can affect the time of sending data to be long and can cause waste of storage space. Therefore, compression is performed to compress the contents of the ...

Back to Top