Search Result Save to File Save as CSV
Your search for 53140 returns 1477 document(s)
Onto absolute as a ontology evaluation methodology in analysis of the structural domains in upper, middle and lower level ontologies. ( hal. 26-33 )
Author: Maziar Amirhosseini, Juhana Salim; | Call Number: SEM-364 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Recognizing partially occluded faces from a sungle exemplar image per person, (LNCS-Lecture Notes in Computer Science 5576) Hal. 100-109
Author: Hamidreza Rashidy Kanan; M. Shhram Moin; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Research and application information security evaluation in website, Hal. 3462-3465
Author: Chungjing Si; Jianghe Yao; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Wanted: more network-security graduates and research, page 22
Author: Linda Dailey P. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Research on Security Protocol Formalization based on Belief (V1-354 -- V1-356)
Author: Kening Liu Junyao Ye Yinliang Wang; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Research and Design a Security Neighbor Discovery Protocol (V1-667 -- V1-670)
Author: Hua Chun Liu Qing Guang Dai; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
From research prototypes to usable, useful systems: lessons learned in the trenches, Hal 139-143
Author: Gurminder Singh; Mark Linton; Brad A.Myers; Gurminder Singh; Marti Szczur; | Call Number: SEM-194 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Research on transformation mechanism from TQM to enterprise innovation ability
Author: Ying Zhang; Yaolie Zhou; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Security risk management building an information security risk management program from the ground up
Call Number: 005.8 Whe s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Structural analysis
Author: Hibbeler, Russel C.; | Call Number: 624.1 Hib s | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next