Search Result Save to File Save as CSV
Your search for 47937 returns 134 document(s)
Parallel decomposition of distance-hereditary graphs, (LNCS-Lecture Notes in Computer Science 1557) Hal 417-426
Author: Sun-Yuan Hsieh; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Construction of abstract state graphs with PVS, (LNCS-Lecture Notes in Computer Science 1254) Hal 72-83
Author: Susanne Graf; Hassen Saidi; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Neural Correlates of Multidimensional Visualizations: An fMRI Comparison of Bubble and Three-Dimensional Surface Graphs Using Evolutionary Theory, Page 1097-1116
Author: Eric Walden, Gabriel S. Cogo, David J. Lucus, Elshan Moradiabadi, and Roozmehr Safi | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Teaching Graphs of Functions in the Cartesian Plane: Should We Re-think our Approach in Secondary Maths? (346-356)
Author: Jim Claffey; | Call Number: SEM-351 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
High tech start-up: the complete handbook for creating succesful new high tech companies/John L. Neisheim
Author: Nesheim, John L.; | Call Number: 338.9 Nes h | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Linux bible 2006 edition: boot up to fedora, knoppix, debian, suse, ubuntu, and 7 other distributions
Author: Negus, Christopher; | Call Number: 005.432 Neg l | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Groupwork close up: a comparisan of the group design process with and without a simple group editor, page 321
Author: Judith S. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Security risk management building an information security risk management program from the ground up
Call Number: 005.8 Whe s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Perangkat lunak data mining pengektraksi kaidah asosiasi menggunakan dekomposisi lattice dan metode pencarian bottom-up
Author: Arif Djunaidy; Rully Soelaiman, Hera H. Evianti; | Call Number: SEM-273 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Capturing bottom-up information technology use processes: a complex adaptive systems model, page 505-532
Author: Ning Nan | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   6 7 8 9 10 11 12 13 14  Next