Your search for 13836 returns 5007 document(s) |
Developing a new similarity measure from two different perspectives, page 279 |
Author: Jin Zhang | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Median measure: an approach to IR system evaluation, page 843 |
Author: Howard G. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Mindfulness in Information Technology Use: Definitions, Distinctions, and a New Measure, Page 831-847 |
Author: Jason Bennett Thatcher, Ryan T. Wright, Heshan Sun, Thomas J. Zagenczyk, and Richard Klein | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Physical Constraints on Feedrates and Feed Accelerations along Curved tool Paths, page 337-360 |
Author: R. T. Farouki, [et all] | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The Nature and Processing of Errors in Interactive Behavior, page 205-248 |
Author: Wayne D. Gray | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Modelling of chaotic behavior in power systems using recurrent neural networks, Hal. 51-56 |
Author: I Made Ginarsa; | Call Number: SEM-303 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Modelling choatic behavior in power systems using recurrent neural networks, Hal. 51-56 |
Author: I Made Ginarsa; Adi Soeprijanto; Mauridhi Hery Purnomo; | Call Number: Sem-303 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Describing component behavior using chemical abstract machine, 427-430 |
Author: Jinfu Chen, Huanhuan Wang; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Verifying Composite Service Transactional Behavior Using Event Calculus (353-370) |
Author: Walid Gaaloul
Mohsen Rouached
Claude Godart
Manfred Hauswirth; | Call Number: SEM-376 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Malicious Behavior Describe and Anlysis Using Fuzzy Logic (V1-84 -- V1-88) |
Author: Zhang Yichi
Pang Jianmin
Guo Haoran; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|