Search Result
Save to File
Your search for
40365
returns
1163
document(s)
General Survey on Massive Data Encryption (150-155)
Author: Mengmeng Wang Guiliang Zhu Xiaoqiang Zhang; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Trends in analyzing access to information part I: cross disciplinary conceptualization of access, page 45
Author: Maurren M. | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Trens in analyzing access to informatin part II unique and integrating conceptualizations, page 77
Author: Maureen M. | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Analyzing the extractness of inherent feedback from event-signal and reframing of inquiris in web search, HAL. 636-650
Author: Chandrani Singh; Arpita Gopal and Armajit Singh; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Analyzing the techniques to secure web database applications from SQL injectino attacks, HAL. 1349-1355
Author: Sushila Madan and Supriya Madan; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Propagation model verification using elementary environment spesific method for analyzing 802. 16e system coverage in Bandung city. hal, 15
Author: Andito Dwi Pratomo, Legijono, Denny Sukarman, Hadi Hariyanto; | Call Number: SEM-317 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
An Expert System For Law Of Information System ogramwith A Case Analyzing By Using Soft Computing Pr
Author: Herri Trisna Frianto; | Call Number: SEM-356 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Data science and big data analytics: discovering analyzing visualizing and presenting data EMC education services
Call Number: 006.3 Dat | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Application of Hierarchical Ordered Partitioning and Collapsing Hybrid Method to Analyzing Phylogenetically on Ebola Virus (317-324)
Author: Hengki Muradi Alhadi Bustamam Dian Lestari; | Call Number: SEM-345 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
The design and analysis of parallel algorithms
Author: Akl, Selim G.; | Call Number: 004.35 Akl d | Type: Buku Pusat
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
3
4
5
6
7
8
9
10
11
12
Next