Search Result Save to File Save as CSV
Your search for 41722 returns 213 document(s)
Parallel implementation of domain decomposition methods for the solution of elliptic boundary-value problems, Hal. 395-396
Author: Giovanna Gazzings; Giovanni Sacchi; | Call Number: SEM-229 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
The effect of jacobian evaluation reduction in solving stiff system of initial value problems (IVPS) for ordinary differential equations (ODES),Hal 131-138
Author: Heru Suhartanto; | Call Number: SEM-200 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A Study of logistic industty modularization mode based on value-network theory: case on taizhon logistics park in zhejiang, China, Hal. 3069-3073
Author: Shen Yuyan; Qian Yan; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Analysis of the effect of beacon order and superframe order value to the performance of multishop wireless , hal 93-98
Author: Rudiyanto, Riri Fitri Sari; | Call Number: SEM 304 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Structuring a prallel simulation to improve cache behavior in a shared-memory multiprocessor: the value of distributed synchronization, Hal. 159-162
Author: David R. Cheriton; Hendrik A. Goosen; Hugh Holbrook; Philip Machanick; | Call Number: SEM-188 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Digital businenss strategy and value creation: framing the dynamic cycle of control points, page 617-632
Author: Margherita Pagani | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Arguing the value of virtual worlds: patterns of discursive sensemaking of an innovative technology, page 685-709
Author: Nicholas Berente, Sean Hansen, Jacqueline C. Pike, and Patrick J. Bateman | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
A Deployment value model for inrusion detection sensors, (LNCS-Lecture Notes in Computer Science 5576) Hal. 250-260
Author: Siraj A. Shaikh; Howard Chivers; Philip Nobles; John A. Clark; Hao Chen; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Minucode a fixed-value representation of fingerprint minutiae for biometric cryptosystem, (LNCS-Lecture Notes in Computer Science 5576) Hal. 382-391
Author: Jingyang Shi and Kwok Yan Lam; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Automatic detection of variable and value symmetries, (LNCS-Lecture Notes in Computer Science 3709) Hal 475-489
Author: Jean-Francois Puget; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   11 12 13 14 15 16 17 18 19 20  Next