Your search for 33924 returns 79 document(s) |
Genetic programming IV: routing human-competitive machine intelligent |
Call Number: 006.31 Gen | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Modern solder technology for competitive electronics manufacturing/Jennie S. Hwang |
Author: Hwang, Jennie S.; | Call Number: 621.381 Hwa m | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Management leading & collaborating in a competitive world 9 th ed. |
Author: Bateman, Thomas S.; | Call Number: 658 Bat m | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
IT Risk: turning business threats into competitive advantage/ George Westerman; Richard Hunter |
Author: Westerman, George; | Call Number: 658.403 8 Wes i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Analysis of Complex Systems by Teacher-forced Information Theoretic Competitive Learning (203-208) |
Author: Ryotaro Kamimura
Fumihiko Yoshida; | Call Number: SEM-306 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Trends in analyzing access to information part I: cross disciplinary conceptualization of access, page 45 |
Author: Maurren M. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Trens in analyzing access to informatin part II unique and integrating conceptualizations, page 77 |
Author: Maureen M. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Analyzing the extractness of inherent feedback from event-signal and reframing of inquiris in web search, HAL. 636-650 |
Author: Chandrani Singh; Arpita Gopal and Armajit Singh; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Analyzing the techniques to secure web database applications from SQL injectino attacks, HAL. 1349-1355 |
Author: Sushila Madan and Supriya Madan; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Propagation model verification using elementary environment spesific method for analyzing 802. 16e system coverage in Bandung city. hal, 15 |
Author: Andito Dwi Pratomo, Legijono, Denny Sukarman, Hadi Hariyanto; | Call Number: SEM-317 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|