Search Result Save to File Save as CSV
Your search for 26831 returns 3578 document(s)
The Functions And Main Ways Of Government Audit Safeguarding The National Economic Security (V2-141--V2-144)
Author: Tang Xiao-li Lu Ying; | Call Number: SEM-328 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
New Methods and Tool for the Development and Verification of Safety Functions during Development of Pedestrian Detection Systems (434-438)
Author: Hadj Hamma Tadjine Karsten Schulze Rene Roelling Herold Daniel; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Analisis critical succes factors dan bisnis model layanan pembayaran menggunakan near field communication pada operator Telekomunikasi dengan menggunakan Stof Model
Author: Jimmy Julianto; | Call Number: KA-176 (Softcopy KA-175) | Edition: 2011 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Perancangan campaign management system dengan konsep one-to-one marketing menggunakan metode design science research pada sebuah perusahaan operator telekomunikasi: studi kasus PT.XYZ
Author: Aruna Anggayasti Priyanto; | Call Number: KA-645 (Softcopy KA-643) MAK KA-304 | Edition: 2015 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Fast recursive computation of local axial moments by using primitive kernel functions, (LNCS-Lecture Notes in Computer Science 1557) Hal 596-597
Author: Roman M. Palenichka; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
On the covering radius of second order binary reed-muller code in set of resilliet boolean functions, (LNCS-Lecture Notes in Computer Science 2898), Hal. 82-92
Author: Yuri Borissov; An Braeken; Svetla Nikova; and Preneel; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Enabling Teachers to Perceive the Affordances of a Technologically Rich Learning Environment for Linear Functions in order to Design Units of Work Incorporating Best Practice (242-251)
Author: Jill P Brown; | Call Number: SEM-351 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Graph Theory and Combinatorial Structures: The Heighg of a Random Binary Search Tree, An Analytic Approach to the Height of Binary Search Trees II
Author: B. Reed, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Parallel computations and complex analytic approximations: form diopthantine approximations to quantum mechanics, Hal. 249-254
Author: D.V. Chudnovsky; G.V. Chudnosky; | Call Number: SEM-229 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Factor analytic studies of csp heuristics, (LNCS-Lecture Notes in Computer Science 3709) Hal 712-726
Author: Richard J. Wallace; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   10 11 12 13 14 15 16 17 18 19  Next