Search Result Save to File Save as CSV
Your search for 53603 returns 253 document(s)
Centralization vs. Decentralization of Application Software
Author: David Schuff, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
On Datalog vs Polynomial Time (13-25)
Author: Foto Afrati Stavros S.Cosmadakis Mihalis Yannakakis; | Call Number: SEM-350 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Linux all-in-one for dummies
Author: Dulaney, Emmett; | Call Number: 005.4 Dul l | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Engaging with scholarly digital libraries (publisher platforms): the extent to which ' added-value functions are used, page 826
Author: David N. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
On a class of key agreement protocols which cannot be unconditionally secure, (LNCS-Lecture Notes in Computer Science 2576) Hal 133-145
Author: Frank Niedermeyer; Werner Schindler; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Using language more responsibly, page 128
Author: Simone S. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
How to sell services more profitably, page 90
Author: Werner Reinartz and Wolfgang Ulaga | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Imitation is more valuable than innovation, page 28
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
MSDES: more SDES key agreement for SRTP, 387-390
Author: Somnuk Puangpronpitag, Piyawad Kasabai; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
More programming pearls: confessions of a coder/Jon Bentley
Author: Bentley, Jon; | Call Number: 005 Ben m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next