Search Result Save to File Save as CSV
Your search for 13782 returns 3505 document(s)
Implementasi continuous translation tool untuk aplikasi mobile android
Author: Eva Miranda; | Call Number: KP-2478 (Softcopy KP-1973) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
A Relational Database View Update Translation Mechanism (309-320)
Author: Y. Masunaga; | Call Number: SEM-346 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Klasifikasi tumor otak menggunakan metode local segmented fractal texture binary pattern, Roytated local binary pattern three orthogonal planes dan domintant local binary pattern
Author: Felix Indra Kurniadi; | Call Number: T-1167 (Softcopy T-876) Source Code T-268 | Edition: 2017 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Analisis beneffits, opportunities, costs, dan risks dan aplikasinya dalam pemilihan strategi implementasi information technology infrastructure library
Author: Shelvy Arini; | Call Number: T-1066 (SOFTCOPY T-775) | Edition: 2014 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Why do Enterprises Adopt Natural Language Processing Services? Startups' Landscape and Opportunities in Artificial Intelligence (313-318)
Author: Ricky Nauvaldy Ruliputra Yudho Giri Sucahyo Arfive Gandhi Yova Ruldeviyani; | Call Number: SEM-371 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Inverted index compression using word-aligned binary codes[P.151-166]
Author: Anh, Vo Ngoc | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Dynamic texture recognition using local binary patterns with an application to facial experssion
Author: Guoying Zhao and Matti Pitkikainen | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Solaris 2.3 binary compability manual 80-5302-10 revision A November 1993
Call Number: 005.43 Sol | Type: Buku Manual
Find Similar |  Add To Favorites |  Detail in New Window 
A method of detecting stack overflow vulnerability of binary code of a component, 212-216
Author: Hang Zhengbo, Yang Hebiao, Da Wei; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Binary Search Tree Traversal for Arrick Robot Virtual Assembly Training Module
Author: Nor Farhana Othman, Haslina Arshad; | Call Number: SEM-368 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   3 4 5 6 7 8 9 10 11 12  Next