Search Result
Save to File
Your search for
37620
returns
2945
document(s)
Pengembangan dan pemasaran aplikasi mobile berbasis windows phone 7
Author: Raufan Multahada Safari; | Call Number: KP-1230 (Softcopy KP-787) SCKP-418 | Type: Kerja Praktek (KP)
Find Similar
|
Add To Favorites
|
Detail in New Window
Pengembangan dan pemasaran aplikasi mobile berbasis windows phone 7
Author: Gilang Bhagaskara; | Call Number: KP-1236 (Softcopy KP-795) SCKP-419 | Type: Kerja Praktek (KP)
Find Similar
|
Add To Favorites
|
Detail in New Window
Pengembangan dan pemasaran aplikasi mobile berbasis windows phone 7
Author: Sonya Permata Putri; | Call Number: KP-1145 (Softkopi KP-708) | Type: Kerja Praktek (KP)
Find Similar
|
Add To Favorites
|
Detail in New Window
Pengembangan dan pemasaran aplikasi mobile berbasis windows phone 7
Author: Indah Nurul Aini Razaad; | Call Number: KP-1092 (Softkopi KP-655) | Type: Kerja Praktek (KP)
Find Similar
|
Add To Favorites
|
Detail in New Window
Service Switching Behavior among Mobile Phone Users (136-144)
Author: Farzana Q. Habib Aliah Hanim M. Salleh Nor Liza Abdullah; | Call Number: SEM-331 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Recognizing partially occluded faces from a sungle exemplar image per person, (LNCS-Lecture Notes in Computer Science 5576) Hal. 100-109
Author: Hamidreza Rashidy Kanan; M. Shhram Moin; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
What about vulnerability to a fault attack of the miller's algorithm during an identify based protocols, (LNCS-Lecture Notes in Computer Science 5576) Hal. 122-134
Author: Nadia El Mrabet; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Key-insulated encryption based key pre-distribution scheme fo WSN, (LNCS-Lecture Notes in Computer Science 5576) Hal. 200-209
Author: Weidong Qiu; Yaowei Zhou; Bo Zhu; Yanfei Zheng; Mi Wen; Zheng Gong; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Security evaluation of an infrusion tolerant web service architecture using stochastic activity networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 1-10Hal. 260-269
Author: Zahra Aghajani; Mohammad Abdollahi Azgomi; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Detection DDoS attack using dispersible traffic matrix and weighted moving average, (LNCS-Lecture Notes in Computer Science 5576) Hal. 290-300
Author: Tae Hwan Kim; Dong Seong Kim; Sang Min Lee; Jong Sou Park; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
3
4
5
6
7
8
9
10
11
12
Next