Search Result Save to File Save as CSV
Your search for 46838 returns 4033 document(s)
Benchmark untuk web security, page 18
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
State of IT security 2006, page 26
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Hidden markov random field model selection criteria based on mean field-like approximations, page 1089
Author: F. Forbes | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Self-Tuning Cost Modeling of User-Defined Functions in an Object-Relational DBMS, page 812-853
Author: Z. He, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Distributed Tuning of Boundary Resources: The Case of Apple’s iOS Service System, page 217-243
Author: Ben Eaton, Silvia Elaluf-Calderwood, Carsten Sorensen, and Yougnjin Yoo | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Longitudinal data analysis/ James S. Coleman
Author: Coleman, James S.; | Call Number: 301 Col i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Development of steganography software with least significant bit and substitution monoalphabetic cipher methods for security of message through image (hal 432 - 435)
Author: Iswar Kumbara, Erwin; | Call Number: SEM - 362 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Using a flatbed scanner as a stereoscopic near-field camera, page 38
Author: Richard S. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Volume data mining using 3D field topology analysis, page 46
Author: Issei F. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Augmenting organizational nenory: a field study of answer garden, page 203
Author: Mark S. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next