Search Result Save to File Save as CSV
Your search for 53149 returns 3608 document(s)
Secure authentication system using two-factor authenticatin techniques, HAL. 1048-1054
Author: Supriya Raheja; supriya khaitan and mandeep Kaur; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Building multi-factor authentication provider using asp.net ( hal. E-11/E-16 )
Author: Adith prasetya,Anggi Wijaya,Moehammad Radif,Agus Kurniawan; | Call Number: SEM-366 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Reverse engineering using behavior tree approach, Hal. 207-214
Author: Iis Solichah; Petrus Mursanto; | Call Number: SEM-301 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Simulation of software requirement in behavior tree using SAL
Author: Niken Listya Pratiwi; | Call Number: SK-0969 (Softcopy SK-450) Source code SK-363 | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Evaluating Mid-(k,n) Queries Using B+- Tree (75-84)
Author: Dongseop Kwon Taewong Lee Sukho Lee; | Call Number: SEM-375 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Neural Network Based Transient Stability Model to Analyze The Security of Java-Bali 500 kV Power System (hal 1301-1306)
Author: Irrine Budi Sulistiawati, Muhammad Abdillah, Adi Soeprijanto; | Call Number: SEM-368 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Study On Task Decomposition In Airplane Conseptual Design Based On Business Stability (V2-112--V2-117)
Author: Guanglei Fu Zhongqi Wang Jianjun Wu Jianping Wang; | Call Number: SEM-328 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A study of spatial growing mixing layer by means of linear stability theory using spectral method, HAL. 7-13
Author: M.J. Maghrebi; Z. Zarhami; K. Moradi; M. Farzaneh-Gord; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A comparative analysis of HC-128 and rabbit encryption schemes for pervasive computing in WSN environment, (LNCS-Lecture Notes in Computer Science 5576) Hal 682-691
Author: Firdous Kausar; Ayesha Naureen; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Shoreline Change Detection Based on Multispectral Images Using 2D-Principial Component Analysis of Band Images And Histogram of Oriented Gradient Features
Author: I Gede Wahyu Surya Dharma, Aniati Murni Arymurthy; | Call Number: SEM-372 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next