Skripsi |
| All | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | |
Skripsi contains 126 collection(s) |
Sistem fully homomorphic encryption gentry-halevi yang berdasarkan ideal lattice dan implementasinya menggunakan bahasa pemrograman sage |
Author: Hadi Saputro; | Publisher: Depok: Fakultas Ilmu Komputer, 2013 | Call Number: SK-1195 (Softcopy SK-677) Source code SK-471 | Edition: |
Find Similar | Add To Favorites | Detail in New Window |
Skema Fully homomorphic encryption gentry versi integer dan implementasinya dengan menggunakan bahasa pemrograman python |
Author: Prahesa Kusuma Setia; | Publisher: Depok: Fakultas Ilmu Komputer, 2013 | Call Number: SK-1164 (Softcopy SK-646) | Edition: |
Find Similar | Add To Favorites | Detail in New Window |
Sistem pembangkit puisi otomatis untuk bahasa indonesia menggunakan pendekatan constraint satisfaction problem |
Author: Fam Rashel Putraruddy Scala; | Publisher: Depok: Fakultas Ilmu Komputer, 2013 | Call Number: SK-1178 (Softcopy SK-660) Source code SK-454 | Edition: |
Find Similar | Add To Favorites | Detail in New Window |
Simulasi pembentukan formasi dari robot quadcopter dalam melakukan eksplorasi ruangan menggunakan perangkat lunak V-REP |
Author: Kharda Ahfa; | Publisher: Depok : Fasilkom UI, 2012 | Call Number: SK-1063 Softcopy SK-544) Source Code SK-396 | Edition: |
Find Similar | Add To Favorites | Detail in New Window |
Studi keamanan aplikasi web institusi pendidikan menggunakan testing guide OWASP, studi kasus: scele Fasilkom UI |
Author: Nestor Sar Naru; | Publisher: Depok : Fasilkom UI, 2012 | Call Number: SK-1045 (Softcopy SK-526) | Edition: |
Find Similar | Add To Favorites | Detail in New Window |
Sistem enkripsi berbasiskan identitas boneh-franklin yang memanfaatkan weil pairing dan implementasinya menggunakan bahasa pemrograman java |
Author: Radityo Eko Prasojo; | Publisher: Depok: Fasilkom UI, 2012 | Call Number: SK-1012 (Softcopy SK-493) | Edition: |
Find Similar | Add To Favorites | Detail in New Window |
Steganografi citra berbasis transformasi wavelet dengan metode lifting |
Author: Sely Haudy; | Publisher: Depok: Fasilkom UI, 2012 | Call Number: SK-1009 (Softcopy SK-490) | Edition: |
Find Similar | Add To Favorites | Detail in New Window |
Strategi manajemen perubahan untuk mendukung implementasi knowledge management system (KMS): studi kasus PT. Indonesia Telemedia (Telkomvision) |
Author: Irene Sherlyta Gloria; | Publisher: Depok: Fasilkom UI, 2012 | Call Number: SK-0993 (Softcopy SK-474) | Edition: |
Find Similar | Add To Favorites | Detail in New Window |
Simulation of software requirement in behavior tree using SAL |
Author: Niken Listya Pratiwi; | Publisher: Depok: Fasilkom UI, 2011 | Call Number: SK-0969 (Softcopy SK-450) Source code SK-363 | Edition: |
Find Similar | Add To Favorites | Detail in New Window |
Simulasi perluasan jaringan telekomunikasi secara otonom dengan mobile robot di daerah bencana menggunakan open dynamic engine |
Author: Abdullah Hafidh; | Publisher: Depok: Fasilkom UI, 2011 | Call Number: SK-0955 (Softcopy SK-436) Source code SK-356 | Edition: |
Find Similar | Add To Favorites | Detail in New Window |
Prev 1 2 3 4 5 6 7 8 9 10 Next |