Search Result
Save to File
Your search for
39557
returns
5241
document(s)
Survey of vulnerability and security of mobile ad hoc networks
Author: Siddharth S Rautaray and Sanjeev Sharma; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Optimal resource allocation for muti-service networks, Hal. 33-41
Author: Robert Simon; Boris Jukic, Woan Sun Chang; | Call Number: SEM-260 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer networks and distributed processing, software techniques architecture
Author: Martin, James; | Call Number: 004 Mar c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
ATM: Foundation broadband Networks
Author: Black, Uyless; | Call Number: 621.382 Bla a | Type: Buku Pusat
Find Similar
|
Add To Favorites
|
Detail in New Window
Data Protection And Employee Behavior: The Role Of Information Systems Security Culture (516-520)
Author: Lena Connolly Michael Lang; | Call Number: SEM-329 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Mobile & wireless networks/ Uyless Black
Author: Black, Uyless; | Call Number: 621.382 Bla s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Simulation of computer communication systems
Author: Sauer, Charles; | Call Number: 004.65 Sau s | Type: Buku Pusat
Find Similar
|
Add To Favorites
|
Detail in New Window
Systems network architecture: a tutorial
Author: Meijer, Anton; | Call Number: 004.6 Mei s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Combination Of Time Series Forecasts using Neural Network
Author: Agus Widodo; | Call Number: SEM-368 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
A Fast and accurate face detector based on neural networks, page 42
Author: R. Reraud | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
20
21
22
23
24
25
26
27
28
29
Next