Search Result
Save to File
Your search for
44857
returns
686
document(s)
The Fiction Of A Factual Approach to Decision-Making (19)
Author: Sibs von Solms; | Call Number: SEM-311 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Building An Evaluation Of Performance Model For The Cloud E-Learning Service Usiing Hybrid MCDM (52)
Author: Chiu-Hung Su Hao-Lin Tzeng Gwo-Hshiung Tzeng; | Call Number: SEM-311 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Sistem Temu Kembali Informasi berbasis Jaringan Inferensi
Author: Yahma Wisnani; | Call Number: T-0103 | Edition: 1998 | Type: Tesis
Find Similar
|
Add To Favorites
|
Detail in New Window
Pemanfaatan Infrastruktur Seluler untuk Pencegahan Pengambilalihan akun Mobile Banking PT Bank XYZ
Author: Aldiansah Prayogi; | Call Number: KA-1707 (Softcopy KA-1698) MAK KA-1344 | Edition: 2023 | Type: Karya Akhir (KA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Ranking Non-Dominated Solutions In Automated Highway Design Using the Analytic Network Process (ANP) (20)
Author: Soknath Mil Mongkut Piantanakulchai; | Call Number: SEM-311 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Evaluation Business-To-Business M-Commerce In Smes By Using MCDM Approach (34)
Author: Ming-Tsang Lu Gwo-Hshiung Tzeng Shu-Kung Hu yung-Chang-Lin; | Call Number: SEM-311 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Assessing Systems Of Systems' Performance Using A Hierarchical Evaluation Process (65)
Author: Rahim Jassemi-Zargani Nathan Kashyap; | Call Number: SEM-311 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Strategic XML
Author: Means, W. Scott; | Call Number: 005.72 Mea s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Business Intelligence Development for National Defense Equipment Supplier Company
Author: Johanes Iman Anugrah; | Call Number: KP-2734 | Type: Kerja Praktek (KP)
Find Similar
|
Add To Favorites
|
Detail in New Window
Threat Risk Analysis for Cloud Security based on Attack-Defense Trees (106-111)
Author: Ping Wang Wen-Hui Lin Pu-Tsun Kuo Hui-Tang Lin Tzu Chia Wang; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
2
3
4
5
6
7
8
9
10
11
Next