Search Result Save to File Save as CSV
Your search for 41717 returns 7624 document(s)
Performance analysis of heterogeneous computer cluster (hal 182 -186 )
Author: Abdusy Syarif, Saiful Ikhwan, Muhammad Risky; | Call Number: SEM - 362 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Performance analysis of local computer networks/ Joseph L. Hammond
Author: Hammond, Joseph; | Call Number: 004.68 Ham p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Modelling process control for performance evaluation and overtime reduction, HAL. 928-932
Author: Harsimerjeet Khurana; J.S. Sohal and Amit Kaur Mahal; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Study of Localized Data Cleansing Process for ETL Performance Improvement in Independent Datamart
Author: Fivien Nur Savitri , Hira Laksmiwati; | Call Number: SEM-368 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Assessing Systems Of Systems' Performance Using A Hierarchical Evaluation Process (65)
Author: Rahim Jassemi-Zargani Nathan Kashyap; | Call Number: SEM-311 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Toward Catalog of Enterprise Resource Planning (ERP) Implementation Benefits: An Empirical Analysis of an Indonesian Agricultural Company (807-821)
Author: Nita Arryani Sari Achmad Nizar Hidayanto Putu Wuri Handayani; | Call Number: SEM-333 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Bibliometric cartoggraphy of information retrieval research by using co-word analysis, page 817
Author: Ying Ding | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Analysis of multiple query reformulations on the web: the interactive information retrieval context, page 751
Author: Soo Young Rich | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Insider Threats in a Financial Institution: Analysis of Attack-Proneness of Information Systems Applications, page 91-112
Author: Jingguo Wang, Manish Gupta, and H. Raghav Rao | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
The “Invisible Hand” of Piracy: An Economic Analysis of the Information-Goods Supply Chain, Page 1117-1169
Author: Antino Kim, Atanu Lahiri, and Debabrata Dey | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   16 17 18 19 20 21 22 23 24 25  Next