Your search for 45328 returns 2319 document(s) |
A Unified method for dance motion recognition and scoring using a two-layer classifier based on a conditional random field and a stochastic error-correcting context-free grammar |
Author: Yaya Heryadi; | Call Number: Dis-48 (Softcopy Dis- 39) | Type: Disertasi
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An Automatic Detection Method fo High Density Slums based on Regularity Pattern of Housing Using Gabor Filter and GINI Index (347-352) |
Author: Nursidik Heru Praptono
Pahala Sirait
M. Ivan Fanany
Aniati Murni Arymurthy; | Call Number: SEM-319 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A One-phase to Three-phase AC Converter based on a Phase-shift Method using an Analog IC Bucket Bridge Delay (23-27) |
Author: Hanny H. Tumbelaka
Andy Sutrisno; | Call Number: SEM-247 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Mastering BEA weblogic server best practices for building and deploying J2EE applications |
Author: Nyberg, Gregory; | Call Number: 005.12 Nyb m | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Core J2EE patterns: best practice and design strategies 2nd ed. |
Author: Alur, Deepak; | Call Number: 005.133 Alu c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Domain name exchange: a mobile-agent-based shared registry system, page 59 |
Author: Lassad G. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Development of particle swarm fuzzy controller for behavior-based mobile robot, HAL. 366 - 372 |
Author: Andi Adriansyah; | Call Number: SEM-294 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Adaptive cluster based routing protocol with ant colony optimization for mobile ad-hoc network in disaster area |
Author: E. Budianto, A. Hafidh, MS Alvissalim, and A. Wibowo | Call Number: JURNAL ILMU KOMPUTER DAN INFORMASI, Vol. 5 No. 2 June 2012 | Type: UI-ana Indek Artikel
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Securing mobile phone calls with identity-based cryptography, (LNCS-Lecture Notes in Computer Science 5576) Hal. 210-222 |
Author: Mathew Smith; Christian Schridde, Bjorn Agel; Bernd Freisleben; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Fault tolerant secure routing in cluster based mobile sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 722-731 |
Author: Usama Ahmed; Muhammad Arif Wahla; Firdous Kausar; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|