Search Result Save to File Save as CSV
Your search for 38971 returns 4020 document(s)
Automated status identification of microscopic images obtained from malaria thin blood smears using bayes decision: a study case in plasmodium falciparum, Hal. 347-352
Author: D. Anggraini, A.S. Nugroho; C. Pratama; I.E. Rozi; V. Prangesjvara; M. Gunawan; | Call Number: SEM-301 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Measuring Game Development Process Maturity Level at Microsized Game Studio using Digital Game Maturity Model. Case Study: PT. XYZ
Author: Arif Budiman; | Call Number: SK-1638 (Softcopy Sk-1120) | Edition: Eko Kuswardono Budiardjo | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Enhancing Query Perfomance of Library Information Systems using NoSQL DBMS: Case Study on Library Information Systems of Universitas Indonesia (41-46)
Author: Hermansyah Yova Ruldeviyani Rizal Fathoni Aji; | Call Number: SEM-340 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Python in practice: create better programs using concurrency libraries and patterns
Author: Summerfield, Mark; | Call Number: 005.13 Sum p | Type: E-book
Find Similar |  Add To Favorites |  Detail in New Window 
Python in practice: create better programs using concurrency libraries and patterns
Author: Summerfield, Mark; | Call Number: 005.13 Sum p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Application of composition development method for definition of SYNTHESIS information resource query language semantics, (LNCS-Lecture Notes in Computer Science 670) Hal 428-441
Author: Leonid Kalinichenko; Nikolaj Nikitchenko; Vladimir Zadorozhny; | Call Number: 004 Woo f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
The industrial take-up of formal methods in safety-critical and other areas: a perspective, (LNCS-Lecture Notes in Computer Science 670) Hal 183-195
Author: Jonathan Bowen; Victoria Stavridou; | Call Number: 004 Woo f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Windows of vulnerability: a case study analysis, page 52
Author: William A.A. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
User interfaces for symbolic computation: A case study, Hal 1-10
Author: Norbert Kajler; | Call Number: SEM-194 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Knowledge Graph Completeness Analytics: Case Study of Wikidata
Author: Avicenna Wisesa; | Call Number: SK-1695 Softcopy SK-1177 | Edition: Fariz Darari | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   11 12 13 14 15 16 17 18 19 20  Next