Search Result
Save to File
Your search for
47964
returns
3006
document(s)
Articulating design decisions: communicate with stakeholders keep your santy and deliver the best user experience
Author: Greever, Tom; | Call Number: 006.7 Gre a | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Detection DDoS attack using dispersible traffic matrix and weighted moving average, (LNCS-Lecture Notes in Computer Science 5576) Hal. 290-300
Author: Tae Hwan Kim; Dong Seong Kim; Sang Min Lee; Jong Sou Park; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Object-oriented systems analysis and design using UML 3rd ed. (INSTRUCTOR'S MANUAL)
Author: Bennett, Simon; | Call Number: 005.12 Ben o | Type: Instructor's Manual
Find Similar
|
Add To Favorites
|
Detail in New Window
Fundamentals of mobile and pervasive computing
Call Number: 621.384 5 Fun | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Perbandingan robustness protokol routing AODV dan DSR pada jaringan pengindra nirkael menggunakan simulator jaringan NS2
Author: Taufiq Jannuar; | Call Number: SK-0943 (Softcopy SK-424) Source code SK-346 | Type: Skripsi
Find Similar
|
Add To Favorites
|
Detail in New Window
Calibration of robot: a programmable approach, HAL. 858-863
Author: D.R. Ikhar; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Using Constraint programming for solving distance CSP with uncertainty, (LNCS-Lecture Notes in Computer Science 3709) Hal 847
Author: Carlos Grandon; Bertrand Neveu; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Analysis of Text Summarization On A Single Document Using Term Frequency-Inverse Methods Document Frequency (TF-IDF) and Algorithm Vector Space Model (VSM) (A-1 -- A-8))
Author: Khodijah Hulliyah; | Call Number: SEM-316 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Optical fingerprinting to protect data: a proposal, page 23
Author: Nachiketh R. P. | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Tutorial: end user facilites in the 1980's/ James A. Larson
Author: Larson, James A.; | Call Number: 005.3 Lar t | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
5
6
7
8
9
10
11
12
13
14
Next