Search Result Save to File Save as CSV
Your search for 16269 returns 3604 document(s)
Learning word relatedness over time for temporal ranking
Author: Dinda Sigmawaty; Mirna Ardiani; | Call Number: Mak T Jilid 121-139 (T-1333) (Mak T-131) | Type: Makalah Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Integrating geometrical and linguistic analysis for email signature block parsing
Author: Hao Chen | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
An efficient data structure for signature based optimal query processing, HAL. 140-153
Author: Elizabeth Shanthi; Y. Izzaz; V. Sethuraman; R. Nadarajan; | Call Number: SEM-291 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Usability Evaluation Of Electronic Signature Based E-Government Solutions (227-234)
Author: Thomas Zefferer Vesna Krnjic; | Call Number: SEM-329 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Solaris SunOS reference manual section 6.demos section 7, special files
Call Number: 005.43 Sol | Type: Buku Manual
Find Similar |  Add To Favorites |  Detail in New Window 
Flow-based Identification of Botnet Traffic by Mining Multiple Log Files
Author: Mohammad M.Masud,Tahseen Al-Khateeb,Latifur Khan; | Call Number: SEM-305 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A multidimensional digital hashing scheme for files whit composite keys (214-235)
Author: Ekow J. Otoo; | Call Number: SEM-357 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Advanced topics in unix: processes, files and systems/Ronald J. Leach
Author: Leach, Ronald J.; | Call Number: 005.43 Lea a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Design of computer data files 2nd ed./Owen Hansen
Author: Hanson, Owen; | Call Number: 005.74 Han d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Clairvoyant: a cloud-based file surveillance application for protecting confidential files
Author: Rizki Mubarok; | Call Number: KP-2294 (Softcopy 1856) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   5 6 7 8 9 10 11 12 13 14  Next