نتایج جستجو
Cybercrime, Digital Forensics and Jurisdiction
Mohamed Chawki, Ashraf Darwish, Mohammad Ayoub Khan, Sapna Tyagi (auth.), 2015
Darfur: A Tragedy of Climate Change
Mohamed Osman Akasha, 2013
Database and Expert Systems Applications: 11th International Conference, DEXA 2000 London, UK, September 4–8, 2000 Proceedings
Anthony Finkelstein (auth.), Mohamed Ibrahim, Josef Küng, Norman Revell (eds.), 2000
Databases Theory and Applications: 25th Australasian Database Conference, ADC 2014, Brisbane, QLD, Australia, July 14-16, 2014. Proceedings
Hua Wang, Mohamed A. Sharaf (eds.), 2014
Databases Theory and Applications: 26th Australasian Database Conference, ADC 2015, Melbourne, VIC, Australia, June 4-7, 2015. Proceedings
Mohamed A. Sharaf, Muhammad Aamir Cheema, Jianzhong Qi (eds.), 2015
Dates : the genus Phoenix : production, processing, food, and medicinal values
MMohamed Essa; A Manickavasagan; E Sukumar, 2012
Daylighting, Architecture and Health: Building Design Strategies
Mohamed Boubekri, 2008
Daylighting, Architecture and Health: Building Design Strategies
Mohamed Boubekri, 2008
Dependable Computing - EDCC 5: 5th European Dependable Computing Conference, Budapest, Hungary, April 20-22, 2005. Proceedings
Pascal Traverse, Isabelle Lacaze, Jean Souyris (auth.), Mario Dal Cin, Mohamed Kaâniche, András Pataricza (eds.), 2005
Dependable Computing - EDCC 5: 5th European Dependable Computing Conference, Budapest, Hungary, April 20-22, 2005. Proceedings
Pascal Traverse, Isabelle Lacaze, Jean Souyris (auth.), Mario Dal Cin, Mohamed Kaâniche, András Pataricza (eds.), 2005
Design and Modeling of Mechanical Systems: Proceedings of the Fifth International Conference Design and Modeling of Mechanical Systems, CMSM´2013, Djerba, Tunisia, March 25-27, 2013
Sabri Bechir (auth.), Mohamed Haddar, Lotfi Romdhane, Jamel Louati, Abdelmajid Ben Amara (eds.), 2013
Design, Deployment and Performance of 4G-LTE Networks: A Practical Approach
Ayman ElNashar, Mohamed El-saidny, Mahmoud Sherif, 2014
Design, Deployment and Performance of 4G-LTE Networks: A Practical Approach
Ayman ElNashar, Mohamed El-saidny, Mahmoud Sherif, 2014
Detection of Intrusions and Malware, and Vulnerability Assessment: Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005. Proceedings
Michael Venable, Mohamed R. Chouchane, Md Enamul Karim, Arun Lakhotia (auth.), Klaus Julisch, Christopher Kruegel (eds.), 2005
The Age of Deception: Nuclear Diplomacy in Treacherous Times
Mohamed El Baradei, 2011
Challenges in the Management of New Technologies (Management of Technology ? Vol. 1) (Management of Technologies)
Marianne Horlesberger, Mohamed El-nawawi, Tarek Khalil, 2007
Adequacy-Based Placement of WECS in Egypt
Dr. Eng. Mohamed EL-Shimy (Ain Shams University)
Intelligent Integrated Media Communication Techniques
Jurij F. Tasic, Mohamed Najim, Michael Ansorge, 2003
Electrical Energy Systems
Mohamed E. El-Hawary, 2000
Microprocessor Theory and Applications with 68000/68020 and Pentium
Mohamed Rafiquzzaman, 2008
Digital Communication over Fading Channels (Wiley Series in Telecommunications and Signal Processing)
Marvin K.Simon, Mohamed-Slim Alouini, 2004
Digital communication over fading channels: a unified approach to performance analysis
Marvin K. Simon, Mohamed-Slim Alouini, 2000
Optimal VLSI Architectural Synthesis: Area, Performance and Testability
Catherine H. Gebotys, Mohamed I. Elmasry, 1991
Dynamic Security of Interconnected Electric Power Systems - Volume 1
Dr. Eng. Mohamed EL-Shimy (Ain Shams University), 2015
