Your search for 37078 returns 2078 document(s) |
Query language for XML, HAL. 811-816 |
Author: Regina Fernandes, A.S. Alfi; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
GLOBAL QUERY OPTIMIZATION (191-206) |
Author: Timos k. sellis; | Call Number: SEM-360 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Query-by-Humming on Internet (589-600) |
Author: Naoko Kosugi
Hidenobu Nagata
Tadashi Nakanishi; | Call Number: SEM-381 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Using c++ |
Author: Eckel, Bruce; | Call Number: 005.133 Eck u | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Alternate Distribution Strategies for Digital Music |
Author: G. Prem Premkumar | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Choosing strategies for change, page 130 |
Author: John P. Kotter and Leonard A. Schlesinger | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Object models: strategies, patterns and applications |
Author: Coad, Peter; | Call Number: 005.1 Coa o | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Social Media Analytics, Strategies and Governance |
Author: Jahankhani, Hamid
Kendzierskvi, Stefan
Montasari, Reza
Chelvachandran, Nishan; | Type: E-book
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer and communications security: strategies for the 1990 |
Author: Cooper, James Arlin; | Call Number: 005.8 Coo c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
E-Commerce security strategies: protecting the enterprise |
Author: Cameron, Debra; | Call Number: 658.478 Cam e | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|