Your search for 53149 returns 3608 document(s) |
Secure authentication system using two-factor authenticatin techniques, HAL. 1048-1054 |
Author: Supriya Raheja; supriya khaitan and mandeep Kaur; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Building multi-factor authentication provider using asp.net ( hal. E-11/E-16 ) |
Author: Adith prasetya,Anggi Wijaya,Moehammad Radif,Agus Kurniawan; | Call Number: SEM-366 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Reverse engineering using behavior tree approach, Hal. 207-214 |
Author: Iis Solichah; Petrus Mursanto; | Call Number: SEM-301 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Simulation of software requirement in behavior tree using SAL |
Author: Niken Listya Pratiwi; | Call Number: SK-0969 (Softcopy SK-450) Source code SK-363 | Type: Skripsi
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Evaluating Mid-(k,n) Queries Using B+- Tree (75-84) |
Author: Dongseop Kwon
Taewong Lee
Sukho Lee; | Call Number: SEM-375 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Neural Network Based Transient Stability Model to Analyze The Security of Java-Bali 500 kV Power System (hal 1301-1306) |
Author: Irrine Budi Sulistiawati, Muhammad Abdillah, Adi Soeprijanto; | Call Number: SEM-368 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Study On Task Decomposition In Airplane Conseptual Design Based On Business Stability (V2-112--V2-117) |
Author: Guanglei Fu
Zhongqi Wang
Jianjun Wu
Jianping Wang; | Call Number: SEM-328 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A study of spatial growing mixing layer by means of linear stability theory using spectral method, HAL. 7-13 |
Author: M.J. Maghrebi; Z. Zarhami; K. Moradi; M. Farzaneh-Gord; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A comparative analysis of HC-128 and rabbit encryption schemes for pervasive computing in WSN environment, (LNCS-Lecture Notes in Computer Science 5576) Hal 682-691 |
Author: Firdous Kausar; Ayesha Naureen; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Shoreline Change Detection Based on Multispectral Images Using 2D-Principial Component Analysis of Band Images And Histogram of Oriented Gradient Features |
Author: I Gede Wahyu Surya Dharma, Aniati Murni Arymurthy; | Call Number: SEM-372 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|