Search Result
Save to File
Your search for
44857
returns
686
document(s)
Color and texture fusion for mutispectral image segmentation, Hal. 57-62
Author: Sony Hartono Wijaya; Aniati Murni; Dian Chahyati; | Call Number: Sem-303 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Music era classification using hierarchical-level fusion
Author: M. Octaviano Pratama; Mirna Adriani; | Call Number: Mak T Jilid 036-070 (T-1241) (Mak T-046) | Type: Makalah Tesis
Find Similar
|
Add To Favorites
|
Detail in New Window
A Data mining tool for improved resource utilization across Hospitals, HAL. 594-598
Author: Omprakash L. Mandge and K. Subramaian; | Call Number: SEM-291 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
A CPU utilization limit for massively parallel MIMD computer, Hal. 83-92
Author: Timothy Bridges, Sidney W. Kitchel, Robert M. Wehmeister; | Call Number: SEM-173 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Campaign 2.0: analysis social media utilization in 2014 jakarta legislative election
Author: Dean apriana ramadhan; Yani Nurhadryani; Irman Hermadi; | Call Number: sem-320 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Aplikasi utilisasi kerja karyawan (Emloyee Utilization astragraphia)/ Ervina Lerry W.S.
Author: Ervina Lerry W.S.; | Call Number: KP-0347 | Type: Kerja Praktek (KP)
Find Similar
|
Add To Favorites
|
Detail in New Window
Measuring Knowledge Management System Utilization by Government in Various Countries
Author: Herlambang Permadi; Dana Indra Sensuse; | Call Number: Mak T Jilid 096-120 (T-1310) (Mak T-109) | Type: Makalah Tesis
Find Similar
|
Add To Favorites
|
Detail in New Window
Retreval Performance Versus Disc Space Utilization on WORM Optical Discs (306-314)
Author: Stavros Christodoulakis Daniel Alexander Ford; | Call Number: SEM-228 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
The B-method: An introduction
Author: Schneider Steve; | Call Number: 005.1 Sch b | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Trust on web browser: attack vs. defense, (LNCS-Lecture Notes in Computer Science 2576) Hal 241-253
Author: Tie-Yan Li; Yongdong Wu; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
4
5
6
7
8
9
10
11
12
13
Next