Search Result Save to File Save as CSV
Your search for 40171 returns 1553 document(s)
Teknik learning scheme berdasarkan model P-norm pada sistem temu kembali informasi/ Yofi Andri
Author: Yofi Andri; | Call Number: SK-0361 (Softkopi SK-4) | Edition: Zainal Hasibuan | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Fault-Tolerant Clock Synchronization Scheme with Low Power in wireles Sensor Networks (V1-73 -- V1-77)
Author: Xiang Li Wanchen Zhao; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Routing Selection Scheme with Coverage Constraint in Wireless Audio Sensor Networks (V1-390 -- V1-395)
Author: Yan Sun Hongzhong Lan Guotao Zhao Hong Luo; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A Polynomiiyal Time Approximation Scheme for the Traveling Salesman Problem in the Sphere Surface (V1-484 -- V1-488)
Author: Gang Wang Zhigang Luo; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Fair resource Allocation Scheme Using Cooperative Game Theory in Layer 1 VPN (7-10)
Author: Aran Kim, Sangdo Lee Hyeopgeon Lee Yongtae Shin; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Hybrid Control Scheme Incorporating AFC and Input Shaping Technique for A Suspension System (18)
Author: M.Z. Md Zain G. Priyandoko M. Mailah; | Call Number: SEM-307 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Rancangan penerapan audit sistem informasi dengan teknik continuous auditing sebagai sarana evaluasi fungsionalitas sistem informasi berbasis web studi kasus: sistem informasi akademis next- generation Universitas Indonesia
Author: Muhammad Fitriansyah; | Call Number: SK-0966 (Softcopy SK-447) | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults, (LNCS-Lecture Notes in Computer Science 1361) Hal 115-124
Author: F. Bao; R.H. Deng; Y. Hang; A. Jeng; A. D. Narasimhalu; T. Ngair; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Open key exchange: how to defeat dictionary attacks without encrypting public keys, (LNCS-Lecture Notes in Computer Science 939) Hal 79-90
Author: Stefan Lucks; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Manajemen resiko teknologi informasi untuk keberlangsungan layanan public menggunakan framework information technology infrastructure library(ITIL VERSI 3) ( hal. C-34/C-39 )
Author: Irfan Maliki; | Call Number: SEM-366 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   15 16 17 18 19 20 21 22 23 24  Next