انتشارات Ios Pr Inc
Information Modelling and Knowledge Bases Xiii
Hannu Kangassalo, 2002
Information Modelling and Knowledge Bases XV
Yasushi Kiyoki, Yasushi Kiyoki, Eiji Kawaguchi, Hannu Jaakkola, Hannu Kangassalo, 2004
Information Modelling and Knowledge Bases XVII
J. Henno, H. Jaakkola Y. Kiyoki, 2006
Information Modelling and Knowledge Bases XVIII
M. DuzaÂ, H. Jaakkola, Y. Kiyoki and H. Kangassalo, Editors, 2007
Information Modelling and Knowledge Bases XX
Y. Kiyoki, Y. Kiyoki, T. Tokuda, H. Jaakkola, X. Chen, N. Yoshida, 2009
Boolean Functions in Cryptology and Information Security
O.A. Logachev, 2008
Identity-Based Cryptography
M. Joye, M. Joye, G. Neven, 2009
Communicating Process Architectures 2007: WoTUG-30
A. A. Mcewan, 2007
Formal Logical Methods for System Security and Correctness
Orna Grumberg, Orna Grumberg, Tobias Nipkow, Christian Pfaller, 2008
Adaptive Web Sites: A Knowledge Extraction from Web Data Approach
J. D. Velasquez, V. Palade, 2008
Annotation for the semantic web
S. Handschuh, S. Staab, 2003
Applications of Data Mining in E-Business and Finance
Z.-H. Zhou, 2008
Applications of data mining in e-business and finance
Z.-H. Zhou, 2008
Applications of Data Mining in E-Business and Finance
Soares,Peng, Meng at al, 2008
Thinking fluid dynamics with dolphins
Minoru Nagai, 2002
Legal Knowledge and Information Systems: JURIX 2006 - the Nineteenth Annual Conference
T.M. Van Engers, Editors, 2006
Risk and decision analysis in maintenance optimization and flood management
Kallen M.J., Kuniewski S.P. (eds.), 2009
