Search Result Save to File Save as CSV
Your search for 12270 returns 3966 document(s)
Control-Based Quality Adaption in Data Stream Management Systems (746-755)
Author: Yi-Cheng Tu Mohamed Hefeeda Yuni Xia Sunil Prabhakar Song Liu; | Call Number: SEM-375 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Developing Recommender Systems for Personalized Email with Big Data (77-82)
Author: alexander A S Gunawan Tania Derwin Suhartono; | Call Number: SEM-340 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Data Protection And Employee Behavior: The Role Of Information Systems Security Culture (516-520)
Author: Lena Connolly Michael Lang; | Call Number: SEM-329 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Integration of Predictive Route Data in Active Safety Systems (165-167)
Author: Hadj Hamma Tadjine Steven Myslinski Bert Auerbach Karsten Schulze; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Incremental Data Systems: Databases from the Ground Up (408-412)
Author: Stanley B. Zdonik; | Call Number: SEM-245 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Pengelolaan data spasial data menggunakan object-relational database management systems (ORDBMS), Hal. 214-218
Author: Jemmy Paembonan; Aji Hamim Wigena; Yeni Herdiyeni; Mohamad Arief Syafi'i; | Call Number: SEM-273 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Multinational computer systems: an introduction to transnational data flow and data regulation/ Harry Katzan
Author: Katzan, Harry S; | Call Number: 658.049 Kat m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Dokumentasi existing data warehouse, new data warehouse, dan finance directorate information systems PT Bank CIMB Niaga Tbk.
Author: Tiara Aulianingrum; | Call Number: KP-1295 (Softcopy KP-854) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Intrusion-resilient signatures: generic constructions, or defeating strong adversary with minimal assumptions, (LNCS-Lecture Notes in Computer Science 2576) Hal 102-118
Author: Gene Itkis; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Face detection and tracking in a video by propagating detection probabilities, page 1215
Author: R.C. Verma | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   8 9 10 11 12 13 14 15 16 17  Next