Your search for 41717 returns 7624 document(s) |
Performance analysis of heterogeneous computer cluster (hal 182 -186 ) |
Author: Abdusy Syarif, Saiful Ikhwan, Muhammad Risky; | Call Number: SEM - 362 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Performance analysis of local computer networks/ Joseph L. Hammond |
Author: Hammond, Joseph; | Call Number: 004.68 Ham p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Modelling process control for performance evaluation and overtime reduction, HAL. 928-932 |
Author: Harsimerjeet Khurana; J.S. Sohal and Amit Kaur Mahal; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Study of Localized Data Cleansing Process for ETL Performance Improvement in Independent Datamart |
Author: Fivien Nur Savitri , Hira Laksmiwati; | Call Number: SEM-368 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Assessing Systems Of Systems' Performance Using A Hierarchical Evaluation Process (65) |
Author: Rahim Jassemi-Zargani
Nathan Kashyap; | Call Number: SEM-311 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Toward Catalog of Enterprise Resource Planning (ERP) Implementation Benefits: An Empirical Analysis of an Indonesian Agricultural Company (807-821) |
Author: Nita Arryani Sari
Achmad Nizar Hidayanto
Putu Wuri Handayani; | Call Number: SEM-333 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Bibliometric cartoggraphy of information retrieval research by using co-word analysis, page 817 |
Author: Ying Ding | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Analysis of multiple query reformulations on the web: the interactive information retrieval context, page 751 |
Author: Soo Young Rich | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Insider Threats in a Financial Institution: Analysis of Attack-Proneness of Information Systems Applications, page 91-112 |
Author: Jingguo Wang, Manish Gupta, and H. Raghav Rao | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The “Invisible Hand” of Piracy: An Economic Analysis of the Information-Goods Supply Chain, Page 1117-1169 |
Author: Antino Kim, Atanu Lahiri, and Debabrata Dey | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|