Your search for 3545 returns 226 document(s) |
Pengembangan data warehouse menggunakan Nine-STEP methodology |
Author: Hargiyanti Wulan Anggi Utami; | Call Number: SK-1350 (Softcopy SK-832) | Type: Skripsi
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Design and educational applications of a generic step-by-step solver for mathematical problems based on mathematica (hal 192-201) |
Author: Bernhard Zgraggen; | Call Number: SEM-355 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
SOA-BASED enterprise integration a step-by-step guide to service-based application integration |
Author: Roshen, Waseem; | Call Number: 620.001 Ros s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
E-business process modeling: the next big step, page 55 |
Author: Selim Aissi | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Jini home networking: a step toward pervasive computing, page 34 |
Author: Rahul Gupta | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Auto-adaptive step straight-line algorithm, page 67 |
Author: Vincent Boyer | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A sparseness-controlled IPNMS algorithm exploiting variable step size, 23-27 |
Author: Hui Li; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
How to break into data processing: a step by step guide by a top DP recruiter on choosing the right school, landing the first job, and moving upward in a growing higly profitable field/ Laura Steibel Sessions |
Call Number: 004 Sessions, Laura Steibel | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Let the response fit the scandal: a step-bystep guide to tailoring your crisis response, page 82 |
Author: Alice M. Tybout and Michelle Roehm | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
SF-STEP: securing tunnel endopoint using separate filtering IPv4 and IPv6, HAL. 283 - 289 |
Author: Abidah M. Taib; Rahmat Budiarto; | Call Number: SEM-294 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|