Search Result Save to File Save as CSV
Your search for 10387 returns 1364 document(s)
Data object creation and display techniques for the huge database of subscriber cable networks, Hal 184-189
Author: Yasuyuki Kato; Yasuo Kataoka; Yoshihiro Nakamura; Yutaka Mitsunaga; | Call Number: SEM-195 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Range-based localization with area verification for sparse distributed wireless sensor networks, 43-46
Author: Ali Husein Alasiry, Shinji Ohyama; | Call Number: SEM 304 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Built-in security feature of sensor network, HAL. 440 - 447
Author: Kalpana Sharma; Vikash Varum; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Theory frame of water resources security monitoring, Hal. 3737-3741
Author: Mingqi Chang; Lei Xu; Yue Wang; Shaohua Lu; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Intrustion detection system using neural networks, HAL. 787-798
Author: Adel Jahanbani; M. Keshtgari; and AMi; H. M Monadjemi; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Introduction to local area networks with microcomputer experiments
Author: Reiss, Leszek; | Call Number: 004.68 Rei i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan router security policy dengan mengevaluasi screening router study kasus : last mile internet provider
Author: Ferdi S.Tasik; | Call Number: T-0383 (Softcopy T-0022) | Edition: 2003 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Modelling of chaotic behavior in power systems using recurrent neural networks, Hal. 51-56
Author: I Made Ginarsa; | Call Number: SEM-303 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Modelling choatic behavior in power systems using recurrent neural networks, Hal. 51-56
Author: I Made Ginarsa; Adi Soeprijanto; Mauridhi Hery Purnomo; | Call Number: Sem-303 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Data communications, computer networks and OSI 2nd ed/Fred Halsall
Author: Halsall, Fred; | Call Number: 004.6 Hal d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   16 17 18 19 20 21 22 23 24 25  Next