Search Result Save to File Save as CSV
Your search for 47964 returns 3006 document(s)
Articulating design decisions: communicate with stakeholders keep your santy and deliver the best user experience
Author: Greever, Tom; | Call Number: 006.7 Gre a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Detection DDoS attack using dispersible traffic matrix and weighted moving average, (LNCS-Lecture Notes in Computer Science 5576) Hal. 290-300
Author: Tae Hwan Kim; Dong Seong Kim; Sang Min Lee; Jong Sou Park; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Object-oriented systems analysis and design using UML 3rd ed. (INSTRUCTOR'S MANUAL)
Author: Bennett, Simon; | Call Number: 005.12 Ben o | Type: Instructor's Manual
Find Similar |  Add To Favorites |  Detail in New Window 
Fundamentals of mobile and pervasive computing
Call Number: 621.384 5 Fun | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Perbandingan robustness protokol routing AODV dan DSR pada jaringan pengindra nirkael menggunakan simulator jaringan NS2
Author: Taufiq Jannuar; | Call Number: SK-0943 (Softcopy SK-424) Source code SK-346 | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Calibration of robot: a programmable approach, HAL. 858-863
Author: D.R. Ikhar; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Using Constraint programming for solving distance CSP with uncertainty, (LNCS-Lecture Notes in Computer Science 3709) Hal 847
Author: Carlos Grandon; Bertrand Neveu; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Analysis of Text Summarization On A Single Document Using Term Frequency-Inverse Methods Document Frequency (TF-IDF) and Algorithm Vector Space Model (VSM) (A-1 -- A-8))
Author: Khodijah Hulliyah; | Call Number: SEM-316 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Optical fingerprinting to protect data: a proposal, page 23
Author: Nachiketh R. P. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Tutorial: end user facilites in the 1980's/ James A. Larson
Author: Larson, James A.; | Call Number: 005.3 Lar t | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   5 6 7 8 9 10 11 12 13 14  Next