Search Result Save to File Save as CSV
Your search for 51783 returns 4248 document(s)
Pengembangan health service information system PT Unilever Indonesia Tbk.
Author: Lusiana Darmawan; | Call Number: KP-0772 (Softkopi KP-338) (SCKP-209) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Automatic dispatching system and interface design for client service representative dashboard
Author: Desi Ratna Mukti Umpuan; | Call Number: KP-2360 (Softcopy KP-1919) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan service level management system PT. IBM Indonesia
Author: Darien Hamidjaja; | Call Number: KP-2160 (Softcopy KP-1722) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan service level management system PT. IBM Indonesia
Author: Gary Alexander Parung; | Call Number: KP-2161 (Softcopy KP-1723) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Backend developer internship ticketing system for custumer service kudo
Author: Adlian Zaim AKbar; | Call Number: KP-2041 (Softcopy KP-1603) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan modul service request pada collers property management system
Author: Christian Regensius; | Call Number: KP-1127 (Softkopi KP-690) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Enhanced Distributed Service Model For Power System State Estimation (709-716)
Author: V.Gomathi V.Ramachandran; | Call Number: SEM-323 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A mathematical approach towards trust based security in pervasive computing environment, (LNCS-Lecture Notes in Computer Science 5576) Hal 702-711
Author: Naima Iltaf; Mukhtar Hussain; Farrukh Kamran; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Security protocols for biometrics-based cardholder authentication in smartcards, (LNCS-Lecture Notes in Computer Science 2576) Hal 254-264
Author: Luciano Rila; Chris J. Mitchell; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
PS-LTL for constraint-based security protocol analysis, (LNCS-Lecture Notes in Computer Science 3668) Hal 439-440
Author: Ricardo Corin; Ari Saptawijaya; Sandro Etalle; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   14 15 16 17 18 19 20 21 22 23  Next