Search Result
Save to File
Your search for
44138
returns
606
document(s)
Clairvoyant: a cloud-based file surveillance application for protecting confidential files
Author: Rizki Mubarok; | Call Number: KP-2294 (Softcopy 1856) | Type: Kerja Praktek (KP)
Find Similar
|
Add To Favorites
|
Detail in New Window
Parallel access to files in the vesta file system, Hal. 472-481
Author: Peter F. Corbett; Dror G. Feitelson; Jean-Pierre Prost; | Call Number: SEM-193 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Implementation and Performance of Application-Controlled File Caching
Author: Pei Cao, Edward W. Felten, and Kai Li; | Call Number: SEM-215 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Hyfish-an RSS feed based application for sharing files in hybrid wireless networks, HAL. 75-84
Author: Ulf Wehling; Steffen Rothkugel; | Call Number: SEM-289 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
A Review of Contemporary Cloud Based E-Learning Initiatives (175-182)
Author: Heba Fasihuddin Geoff Skinner Rukshan Athauda; | Call Number: SEM-330 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Developing a video player application for phillips file standard for pictoral data format (NXPP): a project view approach (hal 335 - 339 )
Author: Eko Handoyo, Restiono Djati Kusumo; | Call Number: SEM - 362 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Inverted files versus signature files for text indexing
Author: Zustin Zobel | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Compressing inverted files[P.5-19]
Author: Trotman, Andrew | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Cyber attacks protecting national infrastructure
Author: Amoroso, Edward G.; | Call Number: 363.3 Amo c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
E-Commerce security strategies: protecting the enterprise
Author: Cameron, Debra; | Call Number: 658.478 Cam e | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev 1
2
3
4
5
6
7
8
9
10
Next