Your search for 45250 returns 545 document(s) |
An ontology-based binary-categorization binary-categorization approach for recognizing multiple-record web documents using a probalistic retrieval model/ Quan Yuan |
Author: Wang, Quan; Yiu-Kai NG | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The raise development method/The Raise method Group |
Call Number: 005.12 Rai | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An Introduction to the finite element method |
Author: Reddy, J.N.; | Call Number: 620.001 Red i | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Method of programming/Edger W. Dijkstra |
Author: Dijkstra, Edger W.; | Call Number: 005.1 Dij m | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The discrepancy method: randomness and complexity |
Author: Chazella, Bernard; | Call Number: 512.7 Cha d | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An analysis of the finite element method |
Author: Strang, Gilbert; | Call Number: 515.62 Str a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The finite element method for engineers |
Author: Huebner, Kenneth H.; | Call Number: 515.62 Hue f | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An introduction to the finite element method |
Author: Reddy, J.N.; | Call Number: 620.001 Red i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Applied cryptography: protocols, algorithms and source code in C |
Author: Schneier, Bruce; | Call Number: 005.82 Sch a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Malicious code moves to mobile devices, page 16 |
Author: Neal Leavitt | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|