Search Result Save to File Save as CSV
Your search for 16492 returns 3539 document(s)
Evaluating the Size of Queries on Relational Databases with non Uniform Distribution and Stochastic Dependence (8-14)
Author: Silvio Salza Mario Terranova; | Call Number: SEM-228 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
An Instant and Accurate Size Estimation Method for Joins and Selection in a Retrieval-Intensive Environment (79-88)
Author: Wei Sun Yibei Ling Naphtali Rishe Yi Deng; | Call Number: SEM-245 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Metode requirements recovery dan rekonstruksi requirements dari perangkat lunak jadi dengan basis end-to-end interaction
Author: Elviawaty Muisa Zamzami; | Call Number: Ringdis-28 | Type: Ringkasan Disertasi
Find Similar |  Add To Favorites |  Detail in New Window 
Metode requirements recovery dan rekonstruksi requirements dari perangkat lunak jadi dengan basis end-to-end interaction
Author: Elviawaty Muisa Zamzami; | Call Number: Dis-28 (Softcopy Dis-19) | Type: Disertasi
Find Similar |  Add To Favorites |  Detail in New Window 
Metode mendapatkan relasi yang erat (tightly coupled) antara non fuctional requirements (NFR) dengan functional requirements (FR)
Author: Nurbojatmiko; | Call Number: Dis-95 Softcopy Dis-86 | Type: Disertasi
Find Similar |  Add To Favorites |  Detail in New Window 
Return on investment (ROI) of a multilevel authentication design for acces control
Author: Ford Lumban Gaol dan Belawati Widjaja | Call Number: JIKT-6-1-September2006-1 | Type: UI-ana Indek Artikel
Find Similar |  Add To Favorites |  Detail in New Window 
Fingerprint authentication system using a low-priced webcam, HAL. 689-698
Author: Md. Rajibhul Islam; Md. Shohel Sayeed and Andrews Samraj; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Secure authentication system using two-factor authenticatin techniques, HAL. 1048-1054
Author: Supriya Raheja; supriya khaitan and mandeep Kaur; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
An Improved CRT-based broadcast authentication scheme in WSNs, hal. 47-50
Author: Yunjie Zhu, YuShen; | Call Number: SEM 304 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Converged PKI-Based Authorization,Authentication Management and Delegation for an E-Business
Author: Mani Anand K.P,Narayanasamy P; | Call Number: SEM-305 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   3 4 5 6 7 8 9 10 11 12  Next