Search Result Save to File Save as CSV
Your search for 46941 returns 3781 document(s)
Composite Objects Revisted (337-347)
Author: Won Kim Elisa Bertino Jorge F. Garza; | Call Number: SEM-228 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Utilization Of Online Patent Information And Analysis to Promote Innovation Capacity in Muslim World (E115-E121)
Author: Ragil Yoga Edi,SH.,LLM Harini Yaniar, S.Si Diah Anggraeni Jatraningrum ST; Irwan Budhi Iswanto; | Call Number: SEM-384 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Software configuration management: coordination for team foductivity
Author: Babich, Wayne A.; | Call Number: 005 Bab s | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Software configuration management: coordination for team foductivity
Author: Babich, Wayne A.; | Call Number: 005 Bab s | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Choosing a learning team: a topological approach,Hal 283-289
Author: Kalvis Apsitis; | Call Number: SEM-202 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Developer team message, talk, review, dan reputation system
Author: Radiya Herwando; | Call Number: KP-2098 (Softcopy KP-1660) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Software engineer pada supply growth team PT. Bukalapak.com
Author: Ilham Kurniawan; | Call Number: KP-2379 (Softcopy KP-1936) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Predicting System Usage from Intention and Past Use: Scale Issues in the Predictors, page 187-196
Author: Sung S. Kim, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
A Framework toward restoration of writing order from single-stroked handwriting image, page 1724
Author: Y. Qiao M. Nishiara | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Model Driven Security: From UML Models to Access Control Infrastructures, page 39-91
Author: D. Basin, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   7 8 9 10 11 12 13 14 15 16  Next