Your search for 20629 returns 6255 document(s) |
Statistical and computational methods in data analysis |
Author: Brandt, Siegmund; | Call Number: 519.5 Bra s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Exploratory data analysis/ John W. Tukey |
Author: Tukey, John Wilder; | Call Number: 519.5 Tuk e | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Refclection from layered surfaces due to subsurface scattering,Hal 165-174 |
Author: Pat Hanranhan; Wolfgang Krueger; | Call Number: SEM-199 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Scheduling with uncertain start dates, (LNCS-Lecture Notes in Computer Science 3709) Hal 872 |
Author: Christine Wei Wu; Kenneth N. Brown; J. Christopher Beck; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Business intelligence data & mapping visualization , fraud analysis, NLP and sentiment analysis |
Author: Aziz Maarij Jamil; | Call Number: KP-2429 | Type: Kerja Praktek (KP)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Talak via SMS |
Author: Tomy dan Randa | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Calculus via numerical analsyis |
Author: Graham, Alexander; | Call Number: 519.4 Gra c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Interactive analysis of computer crimes, page 69 |
Author: Donald E. Brown | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Windows of vulnerability: a case study analysis, page 52 |
Author: William A.A. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Key exchange in Ipsec: analysis of ike, page 50 |
Author: Radia P. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|