Your search for 53656 returns 1454 document(s) |
Digital telephony 3 rd ed. |
Author: Bellamy' John C.; | Call Number: 621.395 Bel d | Edition: Third Edition [3rd ed.] | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Construct measurement and validation procedures in MIS and behavioral research: integrating new and existing techniques, page 293-334 |
Author: Scott B. MacKenzie, Philip M. Podsakoff, and Nathan P. Podsakoff | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Systematic, object-oriented approach towards building a genetic user input validation tool, HAL. 1307-1311 |
Author: Mahashweta Das; Sujogya Banerjee; Bigyan Ankur Mukherjee and Praveen Dhanuka; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A system for object code validation, (LNCS-Lecture Notes in Computer Science 1926) Hal 152-169 |
Author: A. K. Bhattacharjee; Gopa Sen; S. D. Dhodapkar; K. Karunakar; Basant Rajan; R. K. Shyamasundar; | Call Number: 004.33 Jos f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Real options in information technology risk management: An empirical validation of risk-option relationships, page 827-864 |
Author: Michel Benaroch, Yossi Lichtenstein, and Karl Robinson | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Verifikasi protokol otentikasi Horn-Preneel menggunakan A VISPA (Automated Validation of Internet Security Protocols and Applications) |
Author: Ilham Kurnia; | Call Number: SK-0618 (Softkopi SK-99) Source Code SK-88 | Type: Skripsi
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Analisis sentimen berbasis aspek menggunakan latent dirchlet allocation, clustering validation, dan aggregate opinion |
Author: Omar Abdillah; | Call Number: SK-1198 (Softcopy SK-680) Source code SK-474 | Type: Skripsi
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Digital Document Validation Using Cryptography With Des (Data Encryption Standard) Methods (A-37 -- A-40) |
Author: Nenny Anggraini
Feri Fahrianto; | Call Number: SEM-316 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Software rules: how to next generation of technology tools will increase strategic effectiveness and create competitive advantage |
Author: Mark J. Barrenechea; | Call Number: 005.1 Bar s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Concepts and effectiveness of the cover-coefficient-based clustering methodology for text database, page 483 |
Author: Fazli Can | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|