Search Result Save to File Save as CSV
Your search for 5687 returns 578 document(s)
Perancangan modul penjualan customer relationship management dengan notasi Unified modelling language (UML) menggunakan relational rose 2000
Author: Nasriyati; | Call Number: KP-0179 | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
APL in practice: what you need to know to install and use sucessful APL systems and major applications/ edited by Allen J. Rose
Author: Ros, Allen J.; | Call Number: 005.133 Ros a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Pengujian perangkat lunak terotomatisasi dengan menggunakan rational robot dan rational testmanager studi kasus aplikasi E-paspor/ Rina Violyta
Author: Rina Violyta; | Call Number: SK-0770 (Softcopy SK-252) Source code SK-229 | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Optimization of multi-layer feed-forward neural network through second degree superposition, Hal. 32-35
Author: Yan Zhang, Chi Chi Hung, Yi Ding; | Call Number: SEM-275 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Design interior otomatis menggunakan metode rule-based forward chaining dan constraint satisfaction, Hal. IV.5-IV.10
Author: Gregorius S. Budhi; Adi Santosa; Awan Setiawan; | Call Number: SEM-272 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A Forward-secrecy WTLS handshake protocol based on XTR, (LNCS-Lecture Notes in Computer Science 5576) Hal 635-643
Author: Bin Li; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Forward secrecy in password-only key exchange protocols, (LNCS-Lecture Notes in Computer Science 2576) Hal 29-44
Author: Jonathan Katz; Rafail Ostrovsky; Moti Yung; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Weak forward security in mediated RSA, (LNCS-Lecture Notes in Computer Science 2576) Hal 45-54
Author: Gene Tsudik; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Forward-secure signatures with fast key update, (LNCS-Lecture Notes in Computer Science 2576) Hal 241-256
Author: Anton Kozlov; Leonid Reyzin; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Buyer intention to use internet-enabled reverse auctions: the role of asset specificity, product specialization, and non-contractibility, page 705-724
Author: Sunil Mithas, Joni L. Jones, and Will Mitchell | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   8 9 10 11 12 13 14 15 16 17  Next