Search Result Save to File Save as CSV
Your search for 45653 returns 683 document(s)
The Fiction Of A Factual Approach to Decision-Making (19)
Author: Sibs von Solms; | Call Number: SEM-311 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Building An Evaluation Of Performance Model For The Cloud E-Learning Service Usiing Hybrid MCDM (52)
Author: Chiu-Hung Su Hao-Lin Tzeng Gwo-Hshiung Tzeng; | Call Number: SEM-311 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Sistem Temu Kembali Informasi berbasis Jaringan Inferensi
Author: Yahma Wisnani; | Call Number: T-0103 | Edition: 1998 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Pemanfaatan Infrastruktur Seluler untuk Pencegahan Pengambilalihan akun Mobile Banking PT Bank XYZ
Author: Aldiansah Prayogi; | Call Number: KA-1707 (Softcopy KA-1698) MAK KA-1344 | Edition: 2023 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Ranking Non-Dominated Solutions In Automated Highway Design Using the Analytic Network Process (ANP) (20)
Author: Soknath Mil Mongkut Piantanakulchai; | Call Number: SEM-311 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Evaluation Business-To-Business M-Commerce In Smes By Using MCDM Approach (34)
Author: Ming-Tsang Lu Gwo-Hshiung Tzeng Shu-Kung Hu yung-Chang-Lin; | Call Number: SEM-311 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Assessing Systems Of Systems' Performance Using A Hierarchical Evaluation Process (65)
Author: Rahim Jassemi-Zargani Nathan Kashyap; | Call Number: SEM-311 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Business Intelligence Development for National Defense Equipment Supplier Company
Author: Johanes Iman Anugrah; | Call Number: KP-2734 | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Threat Risk Analysis for Cloud Security based on Attack-Defense Trees (106-111)
Author: Ping Wang Wen-Hui Lin Pu-Tsun Kuo Hui-Tang Lin Tzu Chia Wang; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Noteobjects fusion 4.0.1 part no.CD7YFML
Call Number: 005.3 Lot | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   2 3 4 5 6 7 8 9 10 11  Next