Search Results - Tsai
- Showing 1 - 12 results of 12
-
1
Database systems management and use by Tsai
Published 1988Located: Loading… Call Number: QA 76.9.D3 T82 1988Book Loading… -
2
Robot analysis the mechanics of serial and parallel manipulators by Tsai
Published 1999Located: Loading… Call Number: TJ 211 T75 1999Book Loading… -
3
The silicon dragon high-tech industry in Taiwan by Tsai 1964-
Published 2006Located: Loading… Call Number: HC430.5 .Z9 H538 2006Book Loading… -
4
Pengurusan tenaga Elektrik dalam bangunan Kormersil by Cheng, Liang Tsai
Published 2000Located: Loading… Call Number: psm SZE .C364 2000Thesis Book Loading… -
5
From adversaries to partners : chinese & russian military coope by Tsai, Ming-Yen
Published 2003Located: Loading… Call Number: UA770 .T73 2003Book Loading… -
6
Lee Teng-Hui and Taiwan's quest for identity by Shih-shan Henry Tsai
Located: Loading…Book Loading… -
7
Database systems management and use by Tsai lhAlice Y.H
Located: Loading… Call Number: QA 76.9.D3 T82 1988Book Loading… -
8
Distributed real-time systems monitoring, visualization, debugging, and analysis
Published 1996Other Authors: “…Tsai…”
Located: Loading… Call Number: QA 76.9.D5 D587 1996Book Loading… -
9
Advances in machine learning applications in software engineering
Published 2007Other Authors: “…Tsai…”
Located: Loading… Call Number: QA76.758 .A375 2007Book Loading… -
10
Intrusion detection a machine learning approach by Yu, Zhenwei
Published 2011Other Authors: “…Tsai, Jeffrey J.-P…”
Located: Loading… Call Number: TK5105.59 .Y89 2011Book Loading… -
11
Neuro-fuzzy and soft computing a computational approach to learning and machine intelligence by Jang, Jyh-Shing Roger
Published 1997Other Authors: “…Sun, Chuen-Tsai…”
Located: Loading… Call Number: QA 76.9.S63 J36 1997Book Loading… -
12
Intrapersonal & interpersonal untuk remaja by Shahizan Hasan
Published 2005Other Authors: “…Tsai Chen Chien…”
Located: Loading… Call Number: BF724.3 .I55 2005Book Loading…
Search Tools:
Related Subjects
Adolescent psychology
Application software
Computer networks
Computer security
Data base management
Database management
Distributed processing
Electronic data processing
Fuzzy Systems
High technology industries
Interpersonal communication in adolescence
Machine learning
Manipulators (Mechanism)
Military relations
Neural networks (Computer science)
Real-time data processing
Robotics
Security measures
Self-adaptive software
Soft computing
Software engineering
World politics


