Search Result Save to File Save as CSV
Your search for 44857 returns 686 document(s)
Color and texture fusion for mutispectral image segmentation, Hal. 57-62
Author: Sony Hartono Wijaya; Aniati Murni; Dian Chahyati; | Call Number: Sem-303 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Music era classification using hierarchical-level fusion
Author: M. Octaviano Pratama; Mirna Adriani; | Call Number: Mak T Jilid 036-070 (T-1241) (Mak T-046) | Type: Makalah Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
A Data mining tool for improved resource utilization across Hospitals, HAL. 594-598
Author: Omprakash L. Mandge and K. Subramaian; | Call Number: SEM-291 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A CPU utilization limit for massively parallel MIMD computer, Hal. 83-92
Author: Timothy Bridges, Sidney W. Kitchel, Robert M. Wehmeister; | Call Number: SEM-173 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Campaign 2.0: analysis social media utilization in 2014 jakarta legislative election
Author: Dean apriana ramadhan; Yani Nurhadryani; Irman Hermadi; | Call Number: sem-320 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Aplikasi utilisasi kerja karyawan (Emloyee Utilization astragraphia)/ Ervina Lerry W.S.
Author: Ervina Lerry W.S.; | Call Number: KP-0347 | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Measuring Knowledge Management System Utilization by Government in Various Countries
Author: Herlambang Permadi; Dana Indra Sensuse; | Call Number: Mak T Jilid 096-120 (T-1310) (Mak T-109) | Type: Makalah Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Retreval Performance Versus Disc Space Utilization on WORM Optical Discs (306-314)
Author: Stavros Christodoulakis Daniel Alexander Ford; | Call Number: SEM-228 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
The B-method: An introduction
Author: Schneider Steve; | Call Number: 005.1 Sch b | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Trust on web browser: attack vs. defense, (LNCS-Lecture Notes in Computer Science 2576) Hal 241-253
Author: Tie-Yan Li; Yongdong Wu; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   4 5 6 7 8 9 10 11 12 13  Next