Search Result Save to File Save as CSV
Your search for 46844 returns 4042 document(s)
Parallel implementation of domain decomposition methods for the solution of elliptic boundary-value problems, Hal. 395-396
Author: Giovanna Gazzings; Giovanni Sacchi; | Call Number: SEM-229 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
The effect of jacobian evaluation reduction in solving stiff system of initial value problems (IVPS) for ordinary differential equations (ODES),Hal 131-138
Author: Heru Suhartanto; | Call Number: SEM-200 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A Study of logistic industty modularization mode based on value-network theory: case on taizhon logistics park in zhejiang, China, Hal. 3069-3073
Author: Shen Yuyan; Qian Yan; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Analysis of the effect of beacon order and superframe order value to the performance of multishop wireless , hal 93-98
Author: Rudiyanto, Riri Fitri Sari; | Call Number: SEM 304 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Structuring a prallel simulation to improve cache behavior in a shared-memory multiprocessor: the value of distributed synchronization, Hal. 159-162
Author: David R. Cheriton; Hendrik A. Goosen; Hugh Holbrook; Philip Machanick; | Call Number: SEM-188 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A Deployment value model for inrusion detection sensors, (LNCS-Lecture Notes in Computer Science 5576) Hal. 250-260
Author: Siraj A. Shaikh; Howard Chivers; Philip Nobles; John A. Clark; Hao Chen; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Minucode a fixed-value representation of fingerprint minutiae for biometric cryptosystem, (LNCS-Lecture Notes in Computer Science 5576) Hal. 382-391
Author: Jingyang Shi and Kwok Yan Lam; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Automatic detection of variable and value symmetries, (LNCS-Lecture Notes in Computer Science 3709) Hal 475-489
Author: Jean-Francois Puget; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Breaking all value symmetries in surjection problems, (LNCS-Lecture Notes in Computer Science 3709) Hal 490-504
Author: Jean-Francois Puget; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Information technology project management: Providing measurable organizational value 5th ed (INSTRUCTOR'S MANUAL)
Author: Marchewka, Jack T.; | Call Number: 658.403 8 Mar i | Type: Instructor's Manual
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   23 24 25 26 27 28 29 30 31 32  Next