Your search for 38555 returns 3784 document(s) |
Genetic algorithm-based relevance feedback for image retrieval using local similarity patterns, page 1 |
Author: Zoran S. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Construction of weak and strong similarity measures for ordered sets documents using fuzzy set techniques, page 771 |
Author: L. Egghe | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Integration of heterogeneous databases without common domainn using queries based on textual similarity, Hal. 201-212 |
Author: William W. Cohen; | Call Number: SEM-244 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Indonesian wordnet sense disambiguation using cosine similarity and singular value decomposition (hal 234 - 239) |
Author: Syandra Sari, Ruli Manurung, Mirna Adriani; | Call Number: SEM - 362 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Dynamic scheduling on a network heterogenous computer system, (LNCS-Lecture Notes in Computer Science 1557) Hal 584-585 |
Author: Janez Brest; Viljem Zumer; Milan Ojstersek; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
CAVEAT: technique and tool for computer aided verification and transformation, (LNCS-Lecture Notes in Computer Science 939) Hal 70-83 |
Author: E. Pascal Gribomont; Didier Rossetto; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The dark side of timed opacity,(LNCS-Lecture Notes in Computer Science 5576) Hal. 21-30 |
Author: Frank Cassez; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Certificateless signature scheme without random oracles,(LNCS-Lecture Notes in Computer Science 5576) Hal. 31-40 |
Author: Vineela Muppavarapu ad Soon M. Chung; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Grouping provenance information to improve efficiency of access control, (LNCS-Lecture Notes in Computer Science 5576) Hal. 51-59 |
Author: Amril Syalim; Yoshiaki; Konichi Sakurai; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Tagging the turtle: local attestation for kiosk computing, (LNCS-Lecture Notes in Computer Science 5576) Hal. 60-69 |
Author: Ronald Toegl; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|