Search Result Save to File Save as CSV
Your search for 35857 returns 3863 document(s)
The Past, Present and Future of mass Customization-its relevance and implementation in malaysia (E108-E114)
Author: Farhatuzzakiyah Ahmad Fakhrizzaki Norizan Mohd Yasin; | Call Number: SEM-384 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Implementasi Skema Proxy Re-Encryption untuk Kriptografi Kunci Simetris Menggunakan Rust
Author: Josh Steven Lasiman; | Call Number: SK-2313 (Softcopy SK-1795) | Edition: Amril Syamlim | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Threat Risk Analysis for Cloud Security based on Attack-Defense Trees (106-111)
Author: Ping Wang Wen-Hui Lin Pu-Tsun Kuo Hui-Tang Lin Tzu Chia Wang; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
On the resynchronization attack, (LNCS-Lecture Notes in Computer Science 2887) Hal 100-110
Author: Jovan Dj. Golic; Guglielmo Morgari; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Image extraction by quine mc cluskey's tabular method, HAL. 754-757
Author: K. Selvam, B. Poorna; | Call Number: SEM-289 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Free mobile chatting dan conferencing untuk local community menggunakan java programming ( Hal 37 - 44 )
Author: Arini, MT,or Qorrutul ' Aini, MT , Septian Fajar Nugraha, S.KOM; | Call Number: SEM - 365 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
An Adaptive contour closure algorithm and its experimental evaluation, page 1252
Author: X. Jiang | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
An efficient document clustering algorithm and its application to a document browser, page 541
Author: Hideki Tanaka | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Line Graphs of Gamma-Acyclic Database Schemes and its Recognition Algorithm (218-221)
Author: Y.Z. Zhu; | Call Number: SEM-346 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Weak forward security in mediated RSA, (LNCS-Lecture Notes in Computer Science 2576) Hal 45-54
Author: Gene Tsudik; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next