Your search for 52773 returns 1440 document(s) |
Conference proceedings of AFRICOM 87 " Towards the 21st century information communication in developing countries" |
Call Number: SEM-105 | Type: Prosiding Seminar
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Towards guidelines for usability of e-learning applications/ Carmelo Ardito; Maria Fracesca Costabele; Marilena De Marsico |
Author: Ardito, Carmelo; Costabile, Maria F.; De Marsico, Marilena; Lanzillotti, Rosa | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Fingerprint synthesis towards constructing an enhanced authentication system using low resolution webcam, HAL. 679-688 |
Author: Md. Rajibul Islam; Md. Shohel Sayeed and Andrews Samraj; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Systematic, object-oriented approach towards building a genetic user input validation tool, HAL. 1307-1311 |
Author: Mahashweta Das; Sujogya Banerjee; Bigyan Ankur Mukherjee and Praveen Dhanuka; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Step towards high quality one-class collaborative filtering using online social relationships, Hal. 243-248 |
Author: Sirawit Sopechoke and Booserm Kijsrikul; | Call Number: SEM-301 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Towards the Improvement of the Software Quality : An Enterprise 2.0 Architecture for Distributed Software Developments, Hal. 52-59 |
Author: Rafael Fernandez, Javier Soriano,Xabier Larrucea, Andres Leonardo Martinez,Jesus M Gonzalez-Barahona; | Call Number: SEM-305 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A mathematical approach towards trust based security in pervasive computing environment, (LNCS-Lecture Notes in Computer Science 5576) Hal 702-711 |
Author: Naima Iltaf; Mukhtar Hussain; Farrukh Kamran; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Towards an optimal CNF Encoding of boolean cardinality constraints, (LNCS-Lecture Notes in Computer Science 3709) Hal 827-831 |
Author: Carsten Sinz; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Towards the systematic generation of channelling constraints, (LNCS-Lecture Notes in Computer Science 3709) Hal 859 |
Author: B. Martinez-Hernandez; A. M. Frisch; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Towards a mechanization of cryptographic protocol verification, (LNCS-Lecture Notes in Computer Science 1254) Hal 131-142 |
Author: Dominique Bolignano; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|