نتایج جستجو

Proceedings of the 2nd International Scientific Conference of Students and Young Scientists "Theoretical and Applied Aspects of Cybernetics" TAAC-2012
I.O. Lytvynenko (ed.), D.O. Terletskyi (ed.), 2012
Proceedings of the 3rd International Scientific Conference of Students and Young Scientists "Theoretical and Applied Aspects of Cybernetics" TAAC-2013
D.O. Terletskyi (ed.), A.A. Prashchur (ed.), I.O. Lytvynenko (ed.), 2013
Applied Artificial Intelligence
Da Duan, Paolo F Fantoni, Martine De Cock, Mike Nachtegael, Etienne E Kerre, 2006
Applied artificial intelligence: proceedings of the 7th International FLINS Conference, Genova, Italy, 29-31 August 2006
Da Duan, Paolo F Fantoni, Martine De Cock, Mike Nachtegael, Etienne E Kerre, 2006
Applied artificial intelligence: proceedings of the 7th International FLINS Conference, Genova, Italy, 29-31 August 2006
Da Duan, Paolo F Fantoni, Martine De Cock, Mike Nachtegael, Etienne E Kerre, 2006
Applied Regression Analysis Using Stata
Bruderl, 2005
Developments in Applied Artificial Intelligence: 15th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems IEA/AIE 2002 Cairns, Australia, June 17–20, 2002 Proceedings
Demetrios Michalopoulos, Chih-Kang Hu (auth.), Tim Hendtlass, Moonis Ali (eds.), 2002
Applied cryptography
Bruce Schneier, 1995
Business Process Management Applied: Creating the Value Managed Enterprise
Charles C. Poirier; Ian Walker, 2005
3D Reconstruction of Tomographic Images Applied to Largely Spaced Slices
Traina A.J.M., 1997
Applied Cryptography and Network Security: 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006. Proceedings
Ahren Studer, Chenxi Wang (auth.), Jianying Zhou, Moti Yung, Feng Bao (eds.), 2006
Applied Cryptography and Network Security: 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings
Qiong Huang, Duncan S. Wong, Yiming Zhao (auth.), Jonathan Katz, Moti Yung (eds.), 2007
Applied Cryptography and Network Security: 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings
Mark Manulis (auth.), Michel Abdalla, David Pointcheval, Pierre-Alain Fouque, Damien Vergnaud (eds.), 2009
Applied Cryptography and Network Security: First International Conference, ACNS 2003, Kunming, China, October 16-19, 2003. Proceedings
Ventzislav Nikov, Svetla Nikova, Bart Preneel (auth.), Jianying Zhou, Moti Yung, Yongfei Han (eds.), 2003
Applied Cryptography and Network Security: Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004. Proceedings
Michael E. Locasto, Angelos D. Keromytis (auth.), Markus Jakobsson, Moti Yung, Jianying Zhou (eds.), 2004
Applied Cryptography and Network Security: Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005. Proceedings
Jonathan Katz, Philip MacKenzie, Gelareh Taban (auth.), John Ioannidis, Angelos Keromytis, Moti Yung (eds.), 2005
Advances in Web Semantics I: Ontologies, Web Services and Applied Semantic Web
Tharam S. Dillon, Elizabeth Chang, Robert Meersman, Katia Sycara (auth.), Tharam S. Dillon, Elizabeth Chang, Robert Meersman, Katia Sycara (eds.), 2009
Applied SOAP: Implementing .NET XML Web Services
Kenn Scribner, Mark Stiver, 2001
Applied ADO.NET: Building Data-Driven Solutions
David Talbot, Mahesh Chand, 2003
Applied Data Mining for Business and Industry
Paolo Giudici, Silvia Figini, 2009
Applied data mining: statistical methods for business and industry
Paolo Giudici, 2003