نتایج جستجو
Distributed Operating Systems: Theory and Practice
Leslie Lamport (auth.), Yakup Paker, Jean-Pierre Banatre, Müslim Bozyiğit (eds.), 1987
Crisis Theory and World Order: Heideggerian Reflections
Norman K. Swazo, 2002
Crisis Theory and World Order: Heideggerian Reflections
Norman K. Swazo, 2002
A Bayes-optimal sequence-structure theory that unifies protein sequence-structure recognition and alignment
Lathrop R. H., Rogers Jr R. G., Smith T. F., 1998
Advances in Cryptology - ASIACRYPT 2003: 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 – December 4, 2003. Proceedings
Duong Hieu Phan, David Pointcheval (auth.), Chi-Sung Laih (eds.), 2003
Advances in Cryptology - ASIACRYPT 2008: 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings
Martin Hirt, Ueli Maurer, Vassilis Zikas (auth.), Josef Pieprzyk (eds.), 2008
Advances in Cryptology - ASIACRYPT’99: International Conference on the Theory and Application of Cryptology and Information Security, Singapore, November 14-18, 1999. Proceedings
Kenji Koyama, Yukio Tsuruoka, Noboru Kunihiro (auth.), Kwok-Yan Lam, Eiji Okamoto, Chaoping Xing (eds.), 1999
Advances in Cryptology - EUROCRYPT 2007: 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007. Proceedings
Marc Stevens, Arjen Lenstra, Benne de Weger (auth.), Moni Naor (eds.), 2007
Advances in Cryptology - EUROCRYPT 2009: 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings
Mihir Bellare, Dennis Hofheinz, Scott Yilek (auth.), Antoine Joux (eds.), 2009
Advances in Cryptology – ASIACRYPT 2006: 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedings
Christophe De Cannière, Christian Rechberger (auth.), Xuejia Lai, Kefei Chen (eds.), 2006
Advances in Cryptology – ASIACRYPT 2007: 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedings
Kazumaro Aoki, Jens Franke, Thorsten Kleinjung, Arjen K. Lenstra, Dag Arne Osvik (auth.), Kaoru Kurosawa (eds.), 2007
Advances in Cryptology – ASIACRYPT 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings
Alex Biryukov, Dmitry Khovratovich (auth.), Mitsuru Matsui (eds.), 2009
Civil engineering hydraulics: essential theory with worked examples
R. E. Featherstone, C. Nalluri, 1995
Entropy Theory in Hydraulic Engineering: An Introduction
Ph.D., P.E. Vijay P. Singh, 2014
Nalluri & Featherstone's civil engineering hydraulics : essential theory with worked examples
Featherstone, R. E.; Marriott, Martin; Nalluri, C, 2009
A Practical Guide to Program Evaluation Planning: Theory and Case Examples
Debra J. Holden, Marc A. Zimmerman PhD, 2008
Theory and Applications of Drilling Fluid Hydraulics
Alun Whittaker (auth.), Alun Whittaker (eds.), 1985
Theory of Groundwater Flow
A. Verruijt (auth.), 1970
Theory of Hydraulic Models
M. Selim Yalin M.A.S.C.E., M.I.C.E., M.E.I.C. (auth.), 1971
Advanced Structural Damage Detection: From Theory to Engineering Applications
Tadeusz Stepinski, Tadeusz Uhl, Wieslaw Staszewski(auth.), 2013
Modeling of Material Damage and Failure of Structures: Theory and Applications
Professor Dr. Jacek J. Skrzypek, Dr. Artur Ganczarski (auth.), 1999
