Search Result Save to File Save as CSV
Your search for 43421 returns 2193 document(s)
A Pattern reordering approach based on ambiguity detection for online category learning, page 524
Author: E. Grager | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Fast reliable tracking under varying illumination: an approach based on registration of textured-mapped 3D models, page 322
Author: M. La Cascia | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Text categorization based on k-nearest neighbor approach for web site classification, page 25
Author: Oh-Woong Kwon | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Framework of regression-based graph matrix analysis approach in multi-rational social network problem, page 51-57
Author: Ford Lumban Gaol and Belawati Widjaja | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Penerapan dominance-based rough set approach dalam pemeringkatan kualitas desain software berorientasi objek, page 8
Author: Ardhi Tomiarfi dan Petrus Mursanto | Call Number: Jurnal sistem informasi (vol. 5 no. 1 April 2009) | Type: UI-ana Indek Artikel
Find Similar |  Add To Favorites |  Detail in New Window 
Application of dominant-based rough set approach for defining relative quality of object oriented software, HAL. 144-148
Author: Petrus Mursanto; Adhi Yuniarto; | Call Number: SEM-294 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A Sat based approach for solving formulas over boolean and linear mathematical propositions, Hal. 193-210
Author: Gilles Audemard; Piergiorgio Bertoli, Alessandro Cimatti; | Call Number: SEM-281 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Bayesian approach based comment spam defending tool, (LNCS-Lecture Notes in Computer Science 5576) Hal. 578-587
Author: Beatrice cynthia Dhinakaran; Dhinaharan Nagamalai; Jac-Kwang Lee; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A mathematical approach towards trust based security in pervasive computing environment, (LNCS-Lecture Notes in Computer Science 5576) Hal 702-711
Author: Naima Iltaf; Mukhtar Hussain; Farrukh Kamran; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Trace table based approach for pipelined microprocessor verification, (LNCS-Lecture Notes in Computer Science 1254) Hal 364-375
Author: Jun Sawada; Warren A. Hunt Jr; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   7 8 9 10 11 12 13 14 15 16  Next