Your search for 35857 returns 3863 document(s) |
The Past, Present and Future of mass Customization-its relevance and implementation in malaysia (E108-E114) |
Author: Farhatuzzakiyah Ahmad Fakhrizzaki
Norizan Mohd Yasin; | Call Number: SEM-384 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Implementasi Skema Proxy Re-Encryption untuk Kriptografi Kunci Simetris Menggunakan Rust |
Author: Josh Steven Lasiman; | Call Number: SK-2313 (Softcopy SK-1795) | Edition: Amril Syamlim | Type: Skripsi
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Threat Risk Analysis for Cloud Security based on Attack-Defense Trees (106-111) |
Author: Ping Wang
Wen-Hui Lin Pu-Tsun Kuo
Hui-Tang Lin
Tzu Chia Wang; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On the resynchronization attack, (LNCS-Lecture Notes in Computer Science 2887) Hal 100-110 |
Author: Jovan Dj. Golic; Guglielmo Morgari; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Image extraction by quine mc cluskey's tabular method, HAL. 754-757 |
Author: K. Selvam, B. Poorna; | Call Number: SEM-289 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Free mobile chatting dan conferencing untuk local community menggunakan java programming ( Hal 37 - 44 ) |
Author: Arini, MT,or Qorrutul ' Aini, MT , Septian Fajar Nugraha, S.KOM; | Call Number: SEM - 365 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An Adaptive contour closure algorithm and its experimental evaluation, page 1252 |
Author: X. Jiang | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An efficient document clustering algorithm and its application to a document browser, page 541 |
Author: Hideki Tanaka | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Line Graphs of Gamma-Acyclic Database Schemes and its Recognition Algorithm (218-221) |
Author: Y.Z. Zhu; | Call Number: SEM-346 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Weak forward security in mediated RSA, (LNCS-Lecture Notes in Computer Science 2576) Hal 45-54 |
Author: Gene Tsudik; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|