Search Result Save to File Save as CSV
Your search for 16108 returns 6026 document(s)
Principles of data security/ Ernst L. Leiss
Author: Leiss, Ernst L.; | Call Number: 05.8 Lei p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
The agile methods fray, page 90
Author: Tom Demarco | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Statistical and computational methods in data analysis
Author: Brandt, Siegmund; | Call Number: 519.5 Bra s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Access Methods For Multiversion Data (315-324)
Author: David Lomet Betty Salzberg; | Call Number: SEM-228 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Convergence Law for Random Graphs With Specified Degree Sequence, page 727-748
Author: J. F. Lynch | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
A dynamic conditional random field model for foreground and shadow segmentation, page 279
Author: Y. Wang | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Exact optimization for markov random fieds with convex priors, page 1333
Author: H. Ishikawa | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Sketches with curvature: the curve indicator random field and markov processes, page 387
Author: J. August | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
IMPSAC: synthesis of importance sampling and random sample consensus, page 354
Author: P.H.S. Torr | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
National security versus data privacy and security: study of personal data privacy and security in Iran, HAL. 1081-1087
Author: Hassan Allpour and Ebrahim Kiani Harchegant; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next