Search Result
Save to File
Your search for
39777
returns
2955
document(s)
Program selection strategy for prospective students study using a new method of AHP (case study binda sarana informatika), 121-126
Author: Linda Marlinda; | Call Number: SEM-348 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
A Comparative study of HNN and hybrid HNN PSO techniques in the optimization of distributed generation (DG) prower systems
Author: Irraivan Elamvazuthi; | Call Number: SEM-301 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
A Comparative study of HNN and hybrid HNN -PSO techniques in the optimization of distributed generation (DG) power systems, Hal. 195-199
Author: Irraivan Elamvazuthi; | Call Number: SEM-301 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Prototipe Pengembangan Aplikasi Reverse Engineering/ Software Engineering Dengan Case Study Academic Information System University Of Indonesia Untuk Use Case Mempublikasikan Nilai Mahasiswa
Author: Adil Krisnadi Pradana; | Call Number: KP-2563 | Type: Kerja Praktek (KP)
Find Similar
|
Add To Favorites
|
Detail in New Window
Dynamic scheduling on a network heterogenous computer system, (LNCS-Lecture Notes in Computer Science 1557) Hal 584-585
Author: Janez Brest; Viljem Zumer; Milan Ojstersek; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
CAVEAT: technique and tool for computer aided verification and transformation, (LNCS-Lecture Notes in Computer Science 939) Hal 70-83
Author: E. Pascal Gribomont; Didier Rossetto; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
The dark side of timed opacity,(LNCS-Lecture Notes in Computer Science 5576) Hal. 21-30
Author: Frank Cassez; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Certificateless signature scheme without random oracles,(LNCS-Lecture Notes in Computer Science 5576) Hal. 31-40
Author: Vineela Muppavarapu ad Soon M. Chung; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Fine-grain access control using shibboleth for the storage resource broker,(LNCS-Lecture Notes in Computer Science 5576) Hal. 41-50
Author: Vineela Muppavarapu; Soon M. Chung; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Grouping provenance information to improve efficiency of access control, (LNCS-Lecture Notes in Computer Science 5576) Hal. 51-59
Author: Amril Syalim; Yoshiaki; Konichi Sakurai; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
13
14
15
16
17
18
19
20
21
22
Next