Vista to come in six flavours
| Format: | Article |
|---|---|
| Language: | English |
| Published: |
The Star
2008
|
| Subjects: | |
| Online Access: | http://dspace.unimap.edu.my/123456789/783 |
Similar Items
Microsoft profit up 79%
Published: (2008)
Published: (2008)
Using the old to open the new
Published: (2008)
Published: (2008)
Digital forensic investigation reduction model (DIFReM) for Windows 10 OS
by: Shayau, Yazid Haruna
Published: (2018)
by: Shayau, Yazid Haruna
Published: (2018)
Vista : In Or Out ?
Published: (2008)
Published: (2008)
HPC+Azure Environment for Bioinformatics Applications
by: Sidhu, Amandeep, et al.
Published: (2013)
by: Sidhu, Amandeep, et al.
Published: (2013)
Making Windows XP more like Vista
Published: (2008)
Published: (2008)
Forensics visualization of Windows 10 registry
by: Awang, Muhamad Safwan
Published: (2019)
by: Awang, Muhamad Safwan
Published: (2019)
A forensics acquisition method of WhatsApp data on Android smartphone
by: Muzakir, Ummu Khosyatillah
Published: (2018)
by: Muzakir, Ummu Khosyatillah
Published: (2018)
OSS - A needle in a hay stack?
Published: (2008)
Published: (2008)
Identification of High Leverage Points in Multiple Linear Regression / Noor Azima Ismail... [et al.]
by: Ismail, Nor Azima, et al.
Published: (2016)
by: Ismail, Nor Azima, et al.
Published: (2016)
Benchmarking Large Scale Cloud Computing in Asia Pacific
by: Sabri, A., et al.
Published: (2013)
by: Sabri, A., et al.
Published: (2013)
An analysis on the discourse of Powerpoint presentation slides of ESL novice learners / Nurliyana Isa
by: Isa, Nurliyana
Published: (2014)
by: Isa, Nurliyana
Published: (2014)
Guideline for forensic analysis on windows XP and vista registry
by: Aghanvesi, Somayeh
Published: (2008)
by: Aghanvesi, Somayeh
Published: (2008)
Thinking in imperative or objects? A study on how novice programmer thinks when it comes to designing an application
by: Sim, Tze Ying *
Published: (2019)
by: Sim, Tze Ying *
Published: (2019)
Data Mining in Supplier Selection: A Practical Application Using Microsoft SQL Server 2005
by: Sunarya, Rajasa Utama
Published: (2008)
by: Sunarya, Rajasa Utama
Published: (2008)
Easy recovery through environment awareness
by: Hassan, Sa'adah
Published: (2008)
by: Hassan, Sa'adah
Published: (2008)
Steganography : concealing texts within an image using least significant BIT technique on BMP image format / Farabi Aizat Mohd Aminnuddin
by: Mohd Aminnuddin, Farabi Aizat
Published: (2019)
by: Mohd Aminnuddin, Farabi Aizat
Published: (2019)
An approach to support incremental software construction and verification in component-based system development
by: Nejati, Faranak
Published: (2019)
by: Nejati, Faranak
Published: (2019)
Visualising library locations with Mobile Augmented Reality (Lib-MAR) / Nurhidayah Hashim, Ahmad Nadzri Mohamad and Dr. Tengku Adil Tengku Izhar
by: Hashim, Nurhidayah, et al.
Published: (2017)
by: Hashim, Nurhidayah, et al.
Published: (2017)
Analysis of vehicle density estimation for traffic congestion in VANET / Mohamad Afiq Abu Bakar
by: Abu Bakar, Mohamad Afiq
Published: (2019)
by: Abu Bakar, Mohamad Afiq
Published: (2019)
Workflow system for MapReduce in cloud environment
by: Wadi, Muntadher Saadoon
Published: (2017)
by: Wadi, Muntadher Saadoon
Published: (2017)
Designing an interactive multimedia model: case study for learning german language / Sopiah Ishak
by: Ishak, Sopiah
Published: (2004)
by: Ishak, Sopiah
Published: (2004)
Perwakilan pengetahuan menggunakan memory organization
packets bagi sistem perancangan menu kesihatan / Nurkhairizan Khairudin and Azilawati Azizan
by: Khairudin, Nurkhairizan, et al.
Published: (2012)
by: Khairudin, Nurkhairizan, et al.
Published: (2012)
The development of a driver assist system with distance estimation using a single camera / Erma Rahayu Mohd Faizal Abdullah
by: Mohd Faizal Abdullah, Erma Rahayu
Published: (2013)
by: Mohd Faizal Abdullah, Erma Rahayu
Published: (2013)
Runtime pluggable CPU scheduler for linux operating system
by: Al-Maweri, Nasr Addin Ahmed Salem
Published: (2010)
by: Al-Maweri, Nasr Addin Ahmed Salem
Published: (2010)
Estimating software cost with security risk potential
by: Abdullah, Nur Atiqah Sia, et al.
Published: (2009)
by: Abdullah, Nur Atiqah Sia, et al.
Published: (2009)
Classmotvr: Web application to encourage student’s participation in class using gamification / Mariatulqibtiah Makhtar
by: Makhtar, Mariatulqibtiah
Published: (2017)
by: Makhtar, Mariatulqibtiah
Published: (2017)
Automated model-based test case generation using UML activity diagram
by: Monim, Md Abdul
Published: (2018)
by: Monim, Md Abdul
Published: (2018)
Web application as intermediary tool for managing crowdtesting in public service software project
by: Mustapha, Mohd Syahmi
Published: (2019)
by: Mustapha, Mohd Syahmi
Published: (2019)
Implementation of 3-dimensional parcel for management corporation in strata scheme / Siti Nuranissa Eraman
by: Eraman, Siti Nuranissa
Published: (2019)
by: Eraman, Siti Nuranissa
Published: (2019)
Interactive Mathematical Learning Courseware 2. 0 using mental arithmetic for preschool children / Siti Zulaiha Ahmad... [et al.]
by: Ahmad, Siti Zulaiha, et al.
Published: (2014)
by: Ahmad, Siti Zulaiha, et al.
Published: (2014)
Reservation system for premier lounge / Muhammad Faizal Samat ...[et al.]
by: Samat, Muhammad Faizal, et al.
Published: (2020)
by: Samat, Muhammad Faizal, et al.
Published: (2020)
Visualizer for concept relations in an automatic meaning extraction system.
by: Nasharuddin, Nurul Amelina, et al.
Published: (2008)
by: Nasharuddin, Nurul Amelina, et al.
Published: (2008)
Fault recovery mechanisms in utility accrual real time scheduling algorithm
by: Ahmad, Idawaty, et al.
Published: (2009)
by: Ahmad, Idawaty, et al.
Published: (2009)
Cache replacement algorithm using hierarchical allocation scheduling
by: Mohd Sharif, Mohammad Faizal
Published: (2014)
by: Mohd Sharif, Mohammad Faizal
Published: (2014)
Implementation of New Improved Round Robin (NIRR) CPU scheduling algorithm using discrete event simulation
by: Chang, Jan Voon
Published: (2015)
by: Chang, Jan Voon
Published: (2015)
Creating awareness on hand, foot, and mouth disease [HFMD] for preschoolers using gamification / Muhammad Aiman Azuar Anuar
by: Azuar Anuar, Muhammad Aiman
Published: (2019)
by: Azuar Anuar, Muhammad Aiman
Published: (2019)
Emergency injury treatment for UiTM student by using courseware / Masita Zainon
by: Zainon, Masita
Published: (2020)
by: Zainon, Masita
Published: (2020)
UPM jamin keselamatan maklumat sulit laman web
by: Berita Harian, Mohd Feroz Abu BAkar
Published: (2003)
by: Berita Harian, Mohd Feroz Abu BAkar
Published: (2003)
Pangkalan Data : UPM miliki sistem perisian keselamatan multiple
by: Utusan Malaysia, Rajmah Hasan Shirat
Published: (2003)
by: Utusan Malaysia, Rajmah Hasan Shirat
Published: (2003)
Similar Items
-
Microsoft profit up 79%
Published: (2008) -
Using the old to open the new
Published: (2008) -
Digital forensic investigation reduction model (DIFReM) for Windows 10 OS
by: Shayau, Yazid Haruna
Published: (2018) -
Vista : In Or Out ?
Published: (2008) -
HPC+Azure Environment for Bioinformatics Applications
by: Sidhu, Amandeep, et al.
Published: (2013)