Your search for 14307 returns 4621 document(s) |
Aliasing techniques: efficient boundary condition processing for 3D acoustic wave propagation on the CM-5 |
Author: Laurent Anne; Phillippe Klein; | Call Number: SEM-229 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Membuat pixel art menggunakan learning vector quantization ( hal 68 - 76) |
Author: Putra Wahyu AS, Surya Sumpeno , Mauridhi Hery Purnomo; | Call Number: SEM - 365 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Optimization of steel structure by combining evolutionary algorithm and SAP2000 ( hal 76 - 81) |
Author: Mohammad Ghozi, Pujo Aji, Priyo Aji, Priyo Suprobo; | Call Number: SEM - 362 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Market Risk Management For Public Utilities Through AHP (76) |
Author: Massimo fuccaro
Patrizia Simeoni
Fabio De Felice; | Call Number: SEM-311 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Normal Based Subdivision Scheme for Curve Design, page 243-260 |
Author: X. Yang | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
UML-B: Formal Modeling and Design Aided by UML, page 92-122 |
Author: C. Snook, [et all] | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The Interpretation and Utility of Three Cohesion Metrics for Object-Oriented Design, page 123-149 |
Author: S. Counsell, [et all] | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On the Design of a Learning Crawler for Topical Resource Discovery, page 286-309 |
Author: C. C. Aggarwal, [et all] | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
E-process design and assurance using model checking, page 48 |
Author: Wenli Wang | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Digital government security infrastructure design challenges, page 66 |
Author: James Joshi | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|