Search Result Save to File Save as CSV
Your search for 53656 returns 1454 document(s)
Digital telephony 3 rd ed.
Author: Bellamy' John C.; | Call Number: 621.395 Bel d | Edition: Third Edition [3rd ed.] | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Construct measurement and validation procedures in MIS and behavioral research: integrating new and existing techniques, page 293-334
Author: Scott B. MacKenzie, Philip M. Podsakoff, and Nathan P. Podsakoff | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
A Systematic, object-oriented approach towards building a genetic user input validation tool, HAL. 1307-1311
Author: Mahashweta Das; Sujogya Banerjee; Bigyan Ankur Mukherjee and Praveen Dhanuka; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A system for object code validation, (LNCS-Lecture Notes in Computer Science 1926) Hal 152-169
Author: A. K. Bhattacharjee; Gopa Sen; S. D. Dhodapkar; K. Karunakar; Basant Rajan; R. K. Shyamasundar; | Call Number: 004.33 Jos f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Real options in information technology risk management: An empirical validation of risk-option relationships, page 827-864
Author: Michel Benaroch, Yossi Lichtenstein, and Karl Robinson | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Verifikasi protokol otentikasi Horn-Preneel menggunakan A VISPA (Automated Validation of Internet Security Protocols and Applications)
Author: Ilham Kurnia; | Call Number: SK-0618 (Softkopi SK-99) Source Code SK-88 | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Analisis sentimen berbasis aspek menggunakan latent dirchlet allocation, clustering validation, dan aggregate opinion
Author: Omar Abdillah; | Call Number: SK-1198 (Softcopy SK-680) Source code SK-474 | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Digital Document Validation Using Cryptography With Des (Data Encryption Standard) Methods (A-37 -- A-40)
Author: Nenny Anggraini Feri Fahrianto; | Call Number: SEM-316 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Software rules: how to next generation of technology tools will increase strategic effectiveness and create competitive advantage
Author: Mark J. Barrenechea; | Call Number: 005.1 Bar s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Concepts and effectiveness of the cover-coefficient-based clustering methodology for text database, page 483
Author: Fazli Can | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   11 12 13 14 15 16 17 18 19 20  Next