Search Result
Save to File
Your search for
14979
returns
378
document(s)
Methods for unconstrained optimization problems
Author: Kowalik, J.; | Call Number: 519.3 Kow m | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Applied numerical methods with software
Author: Nakamura, Shoichiro; | Call Number: 519.4 Nak a | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Finite element methods in mechanics
Author: Kikuchi, Noboru; | Call Number: 620.001 Kik f | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Numerical methods and software
Author: Kahaner, David; | Call Number: 620.004 2 Kah n | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Mathematical methods for scientist and engineers
Author: Kahn, Peter E.; | Call Number: 501.51 Kah m | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Research methods for information systems
Author: King, Ronald S.; | Call Number: 370.1 Kin r | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Methods and Rules (32-41)
Author: Serge Abiteboul Georg Lausen Heinz Uphoff Emmanuel Waller; | Call Number: SEM-245 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Extending Ingres with Methods and Triggers
Author: Fred Carter; | Call Number: SEM-359 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Cryptography: a new dimension in computer data security: a guide for the design and implementation of secure systems
Author: Meyer, Carl H.; | Call Number: 652.8 Mey c | Type: Buku Pusat
Find Similar
|
Add To Favorites
|
Detail in New Window
Securing mobile phone calls with identity-based cryptography, (LNCS-Lecture Notes in Computer Science 5576) Hal. 210-222
Author: Mathew Smith; Christian Schridde, Bjorn Agel; Bernd Freisleben; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
2
3
4
5
6
7
8
9
10
11
Next