Your search for 2967 returns 6591 document(s) |
Metode split step fourier untuk menyelesaikan nonlinear schrodinger equation pada nonlinear fiber optik, Hal. 1-6 |
Author: Endra; | Call Number: SEM-280 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Step towards high quality one-class collaborative filtering using online social relationships, Hal. 243-248 |
Author: Sirawit Sopechoke and Booserm Kijsrikul; | Call Number: SEM-301 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Overlapped four-step FFT computation, (LNCS-Lecture Notes in Computer Science 1557) Hal 590-591 |
Author: Herbert Karner; Christoph W. Ueberhuber; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Multi-step-ahead Forecasting in Time Series using Cros-Validation ( hal. 103 - 108 ) |
Author: Agus Widodo, Indra Budi; | Call Number: SEM-367 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The Evolution of Relatioship Marketing (RM) towards Customer Relationship Management (CRM): a Step towards Customer Service Excellence (327-335) |
Author: Samsudin Wahab
Abdul Kadir Othman
Baharom Abdul Rahman; | Call Number: SEM-331 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Development of Single Phase Voltage Source Inverter with 18 step Output Waveforms (19-22) |
Author: Joke Pratilastiarso; | Call Number: SEM-247 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Using the common criteria for it security evaluation/ Debra S. Hermann |
Author: Hermann, Debra S.; | Call Number: 005.8 Her s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Implementasi location based service dengan bluetooth dan web service |
Author: Rikky Wenang Purbojati; | Call Number: SK-0571 (Softcopy SK-53) Source Code SK-1 | Type: Skripsi
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network security essentials applications and standards 2nd ed. |
Author: Stallings, William; | Call Number: 005.8 Sta n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Inside network perimeter security: the definitve guide to firewalls, VPNs, routers, and instruction Detection |
Author: Northcutt, Stephen...[et. al.]; | Call Number: 005.8 Ins | Edition: 2003 | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|