نتایج جستجو
Proceedings of the 3rd International Scientific Conference of Students and Young Scientists "Theoretical and Applied Aspects of Cybernetics" TAAC-2013
D.O. Terletskyi (ed.), A.A. Prashchur (ed.), I.O. Lytvynenko (ed.), 2013
Artificial Intelligence and Integrated Intelligent Information Systems: Emerging Technologies and Applications
Xuan F. Zha, Xuan F. Zha, 2006
Developments in Applied Artificial Intelligence: 15th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems IEA/AIE 2002 Cairns, Australia, June 17–20, 2002 Proceedings
Demetrios Michalopoulos, Chih-Kang Hu (auth.), Tim Hendtlass, Moonis Ali (eds.), 2002
Information Modelling and Knowledge Bases XVIII
M. DuzaÂ, H. Jaakkola, Y. Kiyoki and H. Kangassalo, Editors, 2007
Knowledge Management and Acquisition for Smart Systems and Services: 11th International Workshop, PKAW 2010, Daegue, Korea, August 20 - September 3, 2010. Proceedings
Tetsuya Yoshida, Kazuhiro Okatani (auth.), Byeong-Ho Kang, Debbie Richards (eds.), 2010
Model Checking and Artificial Intelligence: 4th Workshop, MoChArt IV, Riva del Garda, Italy, August 29, 2006, Revised Selected and Invited Papers
Piergiorgio Bertoli, Marco Bozzano (auth.), Stefan Edelkamp, Alessio Lomuscio (eds.), 2007
Advances in Cryptology — ASIACRYPT 2001: 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9–13, 2001 Proceedings
Craig Gentry, Jakob Jonsson, Jacques Stern, Michael Szydlo (auth.), Colin Boyd (eds.), 2001
Advances in Cryptology — ASIACRYPT 2002: 8th International Conference on the Theory and Application of Cryptology and Information Security Queenstown, New Zealand, December 1–5, 2002 Proceedings
Arjen K. Lenstra, Adi Shamir, Jim Tomlinson (auth.), Yuliang Zheng (eds.), 2002
Advances in Cryptology — ASIACRYPT’98: International Conference on the Theory and Application of Cryptology and Information Security Beijing, China, October 18–22, 1998 Proceedings
Arjen K. Lenstra (auth.), Kazuo Ohta, Dingyi Pei (eds.), 1998
Cryptography and Security Services: Mechanisms and Applications
Manuel Mogollon, 2008
Cryptography and Security Services: Mechanisms and Applications
Manuel Mogollon, 2008
Alternative DNS Servers: Choice and Deployment, and Optional SQL LDAP Back-Ends
Spider Robinson, 2008
Computational Biology: A Practical Introduction to BioData Processing and Analysis with Linux, MySQL, and R
Röbbe Wünschiers (auth.), 2013
Enterprise Information Systems Assurance And System Security: Managerial And Technical Issues
Merrill Warkentin, Rayford B. Vaughn, 2006
Enterprise: Entrepreneurship and Innovation: Concepts, Contexts and Commercialization
Robin Lowe, Sue Marriott, 2006
Enterprise: Entrepreneurship and Innovation: Concepts, Contexts and Commercialization
Robin Lowe, Sue Marriott, 2006
Environment And the Oecd Guidelines for Multinational Enterprises: Corporate Tools And Approaches
Organisation for Economic Co-Operation a, 2005
