Search Result Save to File Save as CSV
Your search for 53434 returns 1857 document(s)
Invasive Patterns for Distributed Programs (772-789)
Author: Luis Daniel Benavides Navarro Mario Sudholt Remi Douence Jean-Marc Menaud; | Call Number: SEM-376 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Validating a biometric authentication system: sample size requirements, page 1902
Author: S.C. Dass, Y. Zhu | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Spatial size distributions: applications to shape and texture analysis, page 1430
Author: G. Ayala and J. Domingo | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Performance analysis of three routing protocols for varying manet size, HAL. 935-939
Author: N. Vetrivelan; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A weight-size trade-off for circuits with MOD m gates,hal 68-74
Author: Vince Grolmusz; | Call Number: SEM-202 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
An Attraction-selection-attrition theory of online community size and resilience, page 699-728
Author: Brian S. Butler, Patrick J. Bateman, Peter H. Gray, and E. Ilana Diamant | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
A sparseness-controlled IPNMS algorithm exploiting variable step size, 23-27
Author: Hui Li; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Sequential sampling procedures for query size estimation (hal 341 - 350 )
Author: Peter J. Haas, Arun N. Swami; | Call Number: SEM - 359 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Popularity-Aware Greedy Dual-Size Web Proxy Caching Algorithms (254-261)
Author: A. Bestavros S. Jin; | Call Number: SEM-287 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Computer networks a top-down approach
Author: Forouzan, Behrouz A.; | Call Number: 004.6 For c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   16 17 18 19 20 21 22 23 24 25  Next