Search Result Save to File Save as CSV
Your search for 37010 returns 2885 document(s)
Using frequent max substring technique for thai keyword extraction used in thai text mining ( hal 309 - 314)
Author: Todsanai Chumwatana, Kok Wai Wong, Hong Xie; | Call Number: SEM - 362 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Hate Speech Detection on Indonesian Long Text Documents Using Machine Learning Approach
Author: Nofa Aulia; Indra Budi; | Call Number: Mak T Jilid 036-070 (T-1229) (Mak T-036) | Type: Makalah Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
The Study of Dynamic Delivery Adaptive Learning Content in E-Learning Personalization Using Text Mining and Ontology Approach (21-26)
Author: Mira Suryani Zainal A.Hasibuan; | Call Number: SEM-319 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A Decision-Theoretic approach to database selection in networked IR
Author: Norbert F. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Tijah: embracing IR methods in XML databases[P.547-570]
Author: List, Johan | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
The Formalism of probability theory in IR: a foundation or an encumbrance, Hal. 242-247
Author: Win S. Cooper; | Call Number: SEM-256 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A Probabilitic relational model the integration of IR and databases, Hal. 309-317
Author: Norbert Fuhr; | Call Number: SEM-255 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Predicting the performance of linearly combined IR systems, Hal. 190-196
Author: Christopher C. Vogt; | Call Number: SEM-250 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Security analysis of credit card fraud detection and prevention Techniques in intenet banking, HAL. 1062-1072
Author: Sushila Madan; Geetanjali Sah; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Putting advanced reachability analysis techniques together: the ARA tool, (LNCS-Lecture Notes in Computer Science 670) Hal 597-616
Author: Antti Valmari; Jukka Kemppainen; Matthew Clegg; Mikko Levanto; | Call Number: 004 Woo f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   12 13 14 15 16 17 18 19 20 21  Next