Search Result Save to File Save as CSV
Your search for 25569 returns 2243 document(s)
Data Management
Call Number: [13 (1975): 6-12, 14 (1976): 1-12, 15 (1977): 1-12, 16 (1978): 1-12, 17 (1979): 1-12, 19 (1981): 1-12, 21 (1983): 1-4,6, 21 (1983): 8-11, 21 (1983): 8-11, 22 (1984): 1-3, 22 (1984): 1-6, 22 (1984): 7-22, 23 (1984): 1-6, 23 (1984): 7-10,12] | Type: Jurnal/ Majalah
Find Similar |  Add To Favorites |  Detail in New Window 
Data Communications
Call Number: [6 (1977): 1-12, 7 (1978): 1-6, 7 (1978): 7-12, 8 (1979): 1-6, 8 (1979): 7-10, 9 (1980): 1-6, 9 (1980): 7-12, 10 (1981): 1-6, 10 (1981): 7-12, 11 (1982): 1-6, 11 (1982): 7-12, 13 (1984): 1-3, 13 (1984): 1-3, 13 (1984): 4-6, 14 (1985): 7-9, 14 (1985): 10-13, 15 (1986): 1-3, 15 (1986): 11-13, 16 (1987): 1-3, 17 (1988): 2-4, 17 (1988): 5-7, 18 (1989): 8-11,13,15, 25 (1996): 2-7, 25 (1996): 8,10,11,16-17, 26 (1997): 1,7-9, 26 (1997): 10-11, 26 (1997): 12,16,17, 27 (1998): 3,6,7,9] | Type: Jurnal/ Majalah
Find Similar |  Add To Favorites |  Detail in New Window 
Data and communications
Author: Stallings, William; | Call Number: 004.6 Sta d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Data structures with ada
Author: Feldman, Michael B.; | Call Number: 005.133 Fel d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Data structures
Author: Reingold, Edward M.; | Call Number: 005.73 Rei d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Data compression
Author: Held, Gilbert; | Call Number: 005.746 Hel d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Does it need trusted third party? design of buyyer-seller watermarking protocol without trusted third party, (LNCS-Lecture Notes in Computer Science 2576) Hal 265-279
Author: Jae-Gwi Choi; Kouichi Sakurai; Ji-Hwan Park; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Quantitative performance mobile ad-hoc network using optimized link state routing protocol (OLSR) and ad-hoc on-demand distance vector (AODV) (hal 443 - 448)
Author: Andreas Handijo, Justinus Andjarwirawan, Hiem Hok; | Call Number: SEM - 362 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
The X.25 protocol and seven other key CCITT recommendations: X.1., X.2, X.3, X.21, X.21bis, X.28, and X.29/ Reprinted in complete and unbridge form as they appear in fascile viii....
Call Number: 384 Int x | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Data integration simulation using data consolidation
Author: Hadaiq R. Sanabila, Ito Wasito | Call Number: JURNAL ILMU KOMPUTER DAN INFORMASI, Vol. 4 No. 1 2011 | Type: UI-ana Indek Artikel
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   11 12 13 14 15 16 17 18 19 20  Next