Your search for 16108 returns 6075 document(s) |
Security of random data perturbation methods, page 487 |
Author: Muralidhar | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Modified random perturbation method for database security, page 47 |
Author: Tendick, P. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An Enhanced Data Perturbation Approach for Small Data Sets, page 513-529 |
Author: Krishnamurty Muralidhar, [et all] | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Solving queries by tree projections, page 487 |
Author: Sagiv, Yehoshua | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Mumford and shah functional: VLSI analysis and implementation, page 487 |
Author: M. Martina | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Applied methods of the theory of random functions/ A.A. Sveshnikov |
Author: Sveshnikov, A.A.; | Call Number: 519.1 Sve a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Software maintenance management: a stury of the maintenance of computer application software in 487 data processing organization |
Author: Lientz, Bennet P.; | Call Number: 005.133 Lie s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Using data mining methods to build customer profiles, page 74 |
Author: Gediminas A. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Probabilistic data association methods for tracking complex visual objects, page 560 |
Author: C. Rasmussen | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Random walks for image segmentation, page 1768 |
Author: L. Grady | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|