نتایج جستجو
6th Conference on Automated Deduction: New York, USA, June 7–9, 1982
L. Wos (auth.), D. W. Loveland (eds.), 1982
Advanced Symbolic Analysis for Compilers: New Techniques and Algorithms for Symbolic Program Analysis and Optimization
Thomas Fahringer, Bernhard Scholz (eds.), 2003
Advanced Symbolic Analysis for Compilers: New Techniques and Algorithms for Symbolic Program Analysis and Optimization
Thomas Fahringer, Bernhard Scholz (eds.), 2003
New Psycho-Cybernetics
Maxwell Maltz, 2002
Psycho-Cybernetics: A New Way to Get More Living out of Life
Maxwell Maltz, 1976
Psycho-Cybernetics: A New Way to Get More Living out of Life
Maxwell Maltz, 1976
Artificial Intelligence: A New Synthesis
Nils J. Nilsson, 1998
Computational Issues in Fluid Construction Grammar: A New Formalism for the Representation of Lexicons and Grammars
Luc Steels (auth.), Luc Steels (eds.), 2012
Fundamentals of the New Artificial Intelligence: Neural, Evolutionary, Fuzzy and More
Toshinori Munakata, 2007
Advances in Cryptology — ASIACRYPT 2002: 8th International Conference on the Theory and Application of Cryptology and Information Security Queenstown, New Zealand, December 1–5, 2002 Proceedings
Arjen K. Lenstra, Adi Shamir, Jim Tomlinson (auth.), Yuliang Zheng (eds.), 2002
New classes of codes for cryptologists and computer scientists
W. B. Vasantha Kandasamy, Florentin Smarandache, 2008
Progress in Cryptology - INDOCRYPT 2003: 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003. Proceedings
Harald Niederreiter (auth.), Thomas Johansson, Subhamoy Maitra (eds.), 2003
Public Key Cryptography - PKC 2006: 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedings
Daniel Bleichenbacher, Alexander May (auth.), Moti Yung, Yevgeniy Dodis, Aggelos Kiayias, Tal Malkin (eds.), 2006
Theory of Cryptography: Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings
Paul Valiant (auth.), Ran Canetti (eds.), 2008
Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedings
Daniele Micciancio, Shien Jin Ong, Amit Sahai, Salil Vadhan (auth.), Shai Halevi, Tal Rabin (eds.), 2006
Break Free with DB2 9.7: A tour of Cost-Slashing New Features
Paul Zikopoulos, Chris Eaton, Belal Tassi, George Baklarz, 2010
Enterprise Interoperability III: New Challenges and Industrial Approaches
S. Izza, R. Imache, L. Vincent, Y. Lounis (auth.), Professor Dr.-Ing. Kai Mertins, Dr. Rainer Ruggaber, Professor Keith Popplewell, Professor Xiaofei Xu (eds.), 2008
New Frontiers in Enterprise Risk Management
D. L. Olson, D. Wu (auth.), Prof. David L. Olson, Prof. Desheng Wu (eds.), 2008
Public Enterprises: Unresolved Challenges and New Opportunities
United Nations, 2008
Transdisciplinary Digital Art: Sound, Vision and the New Screen
Randy Adams, Steve Gibson, Stefan Müller Arisona, 2008
Enterprise Architecture and New Generation Information Systems
Dimitris N. Chorafas, 2001
