Your search for 49331 returns 2915 document(s) |
A model-based approach for estimating human 3D poses in static images, page 905 |
Author: M.W. Lee | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Fast reliable tracking under varying illumination: an approach based on registration of textured-mapped 3D models, page 322 |
Author: M. La Cascia | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Text categorization based on k-nearest neighbor approach for web site classification, page 25 |
Author: Oh-Woong Kwon | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Framework of regression-based graph matrix analysis approach in multi-rational social network problem, page 51-57 |
Author: Ford Lumban Gaol and Belawati Widjaja | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Penerapan dominance-based rough set approach dalam pemeringkatan kualitas desain software berorientasi objek, page 8 |
Author: Ardhi Tomiarfi dan Petrus Mursanto | Call Number: Jurnal sistem informasi (vol. 5 no. 1 April 2009) | Type: UI-ana Indek Artikel
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Application of dominant-based rough set approach for defining relative quality of object oriented software, HAL. 144-148 |
Author: Petrus Mursanto; Adhi Yuniarto; | Call Number: SEM-294 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Sat based approach for solving formulas over boolean and linear mathematical propositions, Hal. 193-210 |
Author: Gilles Audemard; Piergiorgio Bertoli, Alessandro Cimatti; | Call Number: SEM-281 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Bayesian approach based comment spam defending tool, (LNCS-Lecture Notes in Computer Science 5576) Hal. 578-587 |
Author: Beatrice cynthia Dhinakaran; Dhinaharan Nagamalai; Jac-Kwang Lee; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A mathematical approach towards trust based security in pervasive computing environment, (LNCS-Lecture Notes in Computer Science 5576) Hal 702-711 |
Author: Naima Iltaf; Mukhtar Hussain; Farrukh Kamran; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Trace table based approach for pipelined microprocessor verification, (LNCS-Lecture Notes in Computer Science 1254) Hal 364-375 |
Author: Jun Sawada; Warren A. Hunt Jr; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|