Search Result
Save to File
Your search for
16492
returns
3539
document(s)
Evaluating the Size of Queries on Relational Databases with non Uniform Distribution and Stochastic Dependence (8-14)
Author: Silvio Salza Mario Terranova; | Call Number: SEM-228 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
An Instant and Accurate Size Estimation Method for Joins and Selection in a Retrieval-Intensive Environment (79-88)
Author: Wei Sun Yibei Ling Naphtali Rishe Yi Deng; | Call Number: SEM-245 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Metode requirements recovery dan rekonstruksi requirements dari perangkat lunak jadi dengan basis end-to-end interaction
Author: Elviawaty Muisa Zamzami; | Call Number: Ringdis-28 | Type: Ringkasan Disertasi
Find Similar
|
Add To Favorites
|
Detail in New Window
Metode requirements recovery dan rekonstruksi requirements dari perangkat lunak jadi dengan basis end-to-end interaction
Author: Elviawaty Muisa Zamzami; | Call Number: Dis-28 (Softcopy Dis-19) | Type: Disertasi
Find Similar
|
Add To Favorites
|
Detail in New Window
Metode mendapatkan relasi yang erat (tightly coupled) antara non fuctional requirements (NFR) dengan functional requirements (FR)
Author: Nurbojatmiko; | Call Number: Dis-95 Softcopy Dis-86 | Type: Disertasi
Find Similar
|
Add To Favorites
|
Detail in New Window
Return on investment (ROI) of a multilevel authentication design for acces control
Author: Ford Lumban Gaol dan Belawati Widjaja | Call Number: JIKT-6-1-September2006-1 | Type: UI-ana Indek Artikel
Find Similar
|
Add To Favorites
|
Detail in New Window
Fingerprint authentication system using a low-priced webcam, HAL. 689-698
Author: Md. Rajibhul Islam; Md. Shohel Sayeed and Andrews Samraj; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Secure authentication system using two-factor authenticatin techniques, HAL. 1048-1054
Author: Supriya Raheja; supriya khaitan and mandeep Kaur; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
An Improved CRT-based broadcast authentication scheme in WSNs, hal. 47-50
Author: Yunjie Zhu, YuShen; | Call Number: SEM 304 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Converged PKI-Based Authorization,Authentication Management and Delegation for an E-Business
Author: Mani Anand K.P,Narayanasamy P; | Call Number: SEM-305 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
3
4
5
6
7
8
9
10
11
12
Next