نتایج جستجو
Database Systems for Advanced Applications: 19th International Conference, DASFAA 2014, Bali, Indonesia, April 21-24, 2014. Proceedings, Part I
Sourav S. Bhowmick, Curtis E. Dyreson, Christian S. Jensen, Mong Li Lee, Agus Muliantara, Bernhard Thalheim (eds.), 2014
Database Systems for Advanced Applications: 19th International Conference, DASFAA 2014, Bali, Indonesia, April 21-24, 2014. Proceedings, Part II
Sourav S. Bhowmick, Curtis E. Dyreson, Christian S. Jensen, Mong Li Lee, Agus Muliantara, Bernhard Thalheim (eds.), 2014
Applications of Chaos and Nonlinear Dynamics in Engineering - Vol. 1
S. Lynch (auth.), Santo Banerjee, Mala Mitra, Lamberto Rondoni (eds.), 2011
Applications of Chaos and Nonlinear Dynamics in Science and Engineering - Vol. 2
Bingo Wing-Kuen Ling (auth.), Santo Banerjee, Lamberto Rondoni, Mala Mitra (eds.), 2012
Advances in Spatial Econometrics: Methodology, Tools and Applications
Luc Anselin, Raymond J. G. M. Florax, Sergio J. Rey (auth.), Dr. Luc Anselin, Dr. Raymond J. G. M. Florax, Dr. Sergio J. Rey (eds.), 2004
CMOS Capacitive Sensors for Lab-on-Chip Applications: A Multidisciplinary Approach
Ebrahim Ghafar-Zadeh, Mohamad Sawan (auth.), 2010
Joining textiles: Principles and applications
Ian Jones, 2013
Apprendre et maîtriser LabVIEW par ses applications
Nadia Martaj, Mohand Mokhtari (auth.), 2014
Practical applications and solutions using LabVIEW software
Silviu Folea, 2011
Distributed control applications : guidelines, design patterns, and application examples with the IEC 61499
Strasser, Thomas; Zoitl, Alois, 2016
Contamination Control and Cleanrooms: Problems, Engineering Solutions, and Applications
Alvin Lieberman (auth.), 1992
Botnets: The Killer Web Applications
David Pollino, Bill Pennington, Tony Bradley, Himanshu Dwivedi, 2006
Hacking and Securing iOS Applications
Jonathan Zdziarski, 2012
Hacking and Securing IOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Jonathan Zdziarski, 2012
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Jonathan Zdziarski, 2012
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Jonathan Zdziarski, 2012
Modelling and Applications of Transport Phenomena in Porous Media
J. Bear (auth.), Jacob Bear, J-M. Buchlin (eds.), 1991
Hacking Exposed™ Web applications
Joel Scambray, Mike Shema, 2002
Hacking Exposed™ Web applications
Joel Scambray, Mike Shema, Caleb Sima, 2006
