Search Result
Save to File
Your search for
41869
returns
4471
document(s)
Reverse engineering using behavior tree approach, Hal. 207-214
Author: Iis Solichah; Petrus Mursanto; | Call Number: SEM-301 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
The Influence of teachers' Self-efficacy on Innovative Work Behavior
Author: Hsi-Chi Hsiao, Ya-Ling Tu, Jen-China Chang, Su-Chang Chen; | Call Number: SEM-354 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Citizeinship Behavior Among The Iranian Elementary School Students
Author: A. Navehebrahim, Associate Professor, Somayeh Masoudi; | Call Number: SEM-354 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Group behavior capturing hotevents in cyberspaces on campus, 28-32
Author: Tai Wang, Yu Xiao; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Communications channels: characterization and behavior/ edited by Bernard Goldberg
Call Number: 621.398 1 Com | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Simulation of software requirement in behavior tree using SAL
Author: Niken Listya Pratiwi; | Call Number: SK-0969 (Softcopy SK-450) Source code SK-363 | Type: Skripsi
Find Similar
|
Add To Favorites
|
Detail in New Window
Exploiting IPv46 extension header to handle transmission error fo IPv6 packets over high speed networks
Author: Supriyanto; Izanan H. Hasbullah; Rahmat Budiarto; | Call Number: SEM-294 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Digital watermarking using inter-block correlation: extension to JPEG coded domain, Hal. 133- 138
Author: Yoonki Choi; Kiyoharu Aizawa; | Call Number: SEM-259 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Trust Extension Device: Providing Mobility and Portability of Trust in Cooperative Information System (253-271)
Author: Surya Nepal John Zic Hon Hwang David Moreland; | Call Number: SEM-376 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Efficient and Secure Routing Protocol for Wireless Sensor Networks using Mine Detection (An Extension of Triple Umpiring System for WSN) (141-145)
Author: Ganesh Subramanian Dr.R.Amutha; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
21
22
23
24
25
26
27
28
29
30
Next