Search Result Save to File Save as CSV
Your search for 13291 returns 3714 document(s)
IEEE Trans. on Automatic control
Call Number: [40 (1983): 1-6, 41 (1996): 2-3] | Type: Jurnal/ Majalah
Find Similar |  Add To Favorites |  Detail in New Window 
Automatic user administration/ Lisdiana
Author: Lisdiana; | Call Number: KP-0502 (Softkopi KP-53) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Lower bounds on testing membership to a polyhedron by algebraic decision trees,Hal 635-644
Author: Dima Grigoriev; | Call Number: SEM-202 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Fast algorithms for finding randomized strategies in game trees,Hal 750-759
Author: Daphne koller; | Call Number: SEM-202 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Bootstrap Aggerating of Classification and Regresion Trees in Identification of Single Neucleotidde Polymorphisms. Hal 423-432
Author: Liailan Sahrina Hasibuan, Nurul Hudachair, Muhammad Abrar Istiadi; | Call Number: SEM-372 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Direct spatial search o pictorial data batabases using packed R-trees (17-33)
Author: Nick roussopoulos and Daniel leifker; | Call Number: SEM-357 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Clusters order and trees: methods and applications: in honor of boris mirkin's 70th birthday
Call Number: 519.53 Clu | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Advances in mining graphs, trees and sequences/ edited by Takashi Washio; Joost N. Kok
Call Number: 515.24 Adv | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan dan dokumen modul finance , HR dan estate pada aplikasi treeS berbasis ERP
Author: Aditya Choirul Firdaus; | Call Number: KP-2414 | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Threat Risk Analysis for Cloud Security based on Attack-Defense Trees (106-111)
Author: Ping Wang Wen-Hui Lin Pu-Tsun Kuo Hui-Tang Lin Tzu Chia Wang; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   3 4 5 6 7 8 9 10 11 12  Next