Search Result Save to File Save as CSV
Your search for 37620 returns 2929 document(s)
Pengembangan dan pemasaran aplikasi mobile berbasis windows phone 7
Author: Gilang Bhagaskara; | Call Number: KP-1236 (Softcopy KP-795) SCKP-419 | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan dan pemasaran aplikasi mobile berbasis windows phone 7
Author: Sonya Permata Putri; | Call Number: KP-1145 (Softkopi KP-708) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan dan pemasaran aplikasi mobile berbasis windows phone 7
Author: Indah Nurul Aini Razaad; | Call Number: KP-1092 (Softkopi KP-655) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Service Switching Behavior among Mobile Phone Users (136-144)
Author: Farzana Q. Habib Aliah Hanim M. Salleh Nor Liza Abdullah; | Call Number: SEM-331 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Recognizing partially occluded faces from a sungle exemplar image per person, (LNCS-Lecture Notes in Computer Science 5576) Hal. 100-109
Author: Hamidreza Rashidy Kanan; M. Shhram Moin; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
What about vulnerability to a fault attack of the miller's algorithm during an identify based protocols, (LNCS-Lecture Notes in Computer Science 5576) Hal. 122-134
Author: Nadia El Mrabet; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Key-insulated encryption based key pre-distribution scheme fo WSN, (LNCS-Lecture Notes in Computer Science 5576) Hal. 200-209
Author: Weidong Qiu; Yaowei Zhou; Bo Zhu; Yanfei Zheng; Mi Wen; Zheng Gong; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Security evaluation of an infrusion tolerant web service architecture using stochastic activity networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 1-10Hal. 260-269
Author: Zahra Aghajani; Mohammad Abdollahi Azgomi; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Detection DDoS attack using dispersible traffic matrix and weighted moving average, (LNCS-Lecture Notes in Computer Science 5576) Hal. 290-300
Author: Tae Hwan Kim; Dong Seong Kim; Sang Min Lee; Jong Sou Park; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Side-channel leakage in masked circuits caoused by higher-order circuit effects, (LNCS-Lecture Notes in Computer Science 5576) Hal. 325-336
Author: Zhimin Chen; Syed Haider; Patrick Schaumont; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   3 4 5 6 7 8 9 10 11 12  Next