Your search for 12507 returns 870 document(s) |
On Accessing Object-Oriented Databases: Expressive Power, Complexity, and Restrictions (147-158) |
Author: Richard Hull
Jianwen Su; | Call Number: SEM-228 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Oracle database 10g: the complete reference, master the revolutionary features of oracle database 10g |
Author: Loney, Kevin; | Call Number: 005.74 Lon o | Type: Softcopy Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Oracle database 10g: the complete reference, master the revolutionary features of oracle database 10g |
Author: Loney, Kevin; | Call Number: 005.74 Lon o | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Oracle database 10G DBA handbook: Manage a robust, scalable, and highly available oracle database |
Author: Loney, Kevin; | Call Number: 005.74 Lon o | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Oracle E-business suite financials administration: upgrade, manage, customize, and tune oracle e-business suite financials/Shakaran Iyer |
Author: Iyer, Shankaran; | Call Number: 005.74 Iye o | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Evaluation of stability of k-Means cluster ensembles with respect to random initilization, page1798 |
Author: L.I. Kuncheva | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Convergence Law for Random Graphs With Specified Degree Sequence, page 727-748 |
Author: J. F. Lynch | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Dense photometric stereo: a Markov random field approach, 1830 |
Author: T.P. Wu, K.L. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Fuzzy markov random fields versus chains for multispectral image segmentation, 1753 |
Author: F. Salzenstein | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Modified random perturbation method for database security, page 47 |
Author: Tendick, P. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|