Search Result Save to File Save as CSV
Your search for 46025 returns 613 document(s)
Contracting the State Space of Real-time Pre-emptive Systems (53-58)
Author: Abdelkrim Abdelli; | Call Number: SEM-297 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Consistency, standards, and formal approaches to interface development and evaluation: a note on wiecha, bennett boies, gould and greene
Author: Jonathan Grudin | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Combining preference- and content-based approaches for improving document clsutering effectiveness, page 350
Author: Chih-Ping Wei | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Architectural approaches for multimedia processing (Invited Paper), (LNCS-Lecture Notes in Computer Science 1557) Hal 196-210
Author: Sethuraman (Panch) Panchanathan; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
An object-oriented database for movies-on-demand: two approaches, (LNCS-Lecture Notes in Computer Science 1557) Hal 577-578
Author: Francesco Amalfitano; Antonio d' Acierno; Ivana Marra; Lucio Sansone; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Order-theoretic and categorical approaches to programming language semantics/Petrus Marinus Waltherus Knijnerberg
Author: Knijnemburg, Petrus Marinus Wa.; | Call Number: 005.13 Kni o | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
System fault diagnotics reliability and related knowledge-based approaches vol.1/edited by Spyros Tzafestas
Call Number: 620.004 4 Sys | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Legal Entity Recognition in Indonesian Court Decision Documents Using Bi-LSTM and CRF Approaches
Author: Eka Qadri Nuranti; Evi Yulianti; | Call Number: Mak T Jilid 071-095 (T-1286) (Mak T-085) | Type: Makalah Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Prediction of Drug-Target Interction on Jamu Formulas using Machine Learning Approaches (169-174)
Author: Ahmad Kamal Nasution Sony Hartono Wijaya Wisnu Anata Kusuma; | Call Number: SEM-371 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Iformation security risk management planning: a case study at application module of state asset directorate general of state asset ministry of finance
Author: Sigit Prasetyo; Yudho Giri Sucahyo; | Call Number: sem-320 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   17 18 19 20 21 22 23 24 25 26  Next