نتایج جستجو

Atmospheric Boundary Layers: Nature, Theory, and Application to Environmental Modelling and Security
Alexander Baklanov, Branko Grisogono, 2007
Essays in dynamic general equilibrium theory: Festschrift for David Cass
Alessandro Citanna, John Donaldson, H. Polemarchakis, Paolo Siconolfi, Stephen Spear, 2005
Essays in Dynamic General Equilibrium Theory: Festschrift for David Cass
Alessandro Citanna, John Donaldson, H. Polemarchakis, Paolo Siconolfi, Stephen Spear, 2005
Essays in Dynamic General Equilibrium Theory: Festschrift for David Cass
Suleyman Basak, Anna Pavlova (auth.), Professor Alessandro Citanna, Professor John Donaldson, Professor Herakles Polemarchakis, Professor Paolo Siconolfi, Professor Stephan E. Spear (eds.), 2005
Function Theory on Manifolds Which Possess a Pole
Greene R.E., Wu H., 1979
Function Theory on Manifolds Which Possess a Pole
R.E. Greene, H. Wu, 1979
Health Impact Assessment: Concepts, Theory, Techniques and Applications (Oxford Medical Publications)
John Kemm, Jayne Parry, Stephen Palmer, 2004
Public Relations and Social Theory: Key Figures and Concepts (Routledge Communication Series)
Øyvind Ihlen, Betteke Van Ruler, Magnus Fredriksson, 2009
Distributed Operating Systems: Theory and Practice
Leslie Lamport (auth.), Yakup Paker, Jean-Pierre Banatre, Müslim Bozyiğit (eds.), 1987
Crisis Theory and World Order: Heideggerian Reflections
Norman K. Swazo, 2002
Crisis Theory and World Order: Heideggerian Reflections
Norman K. Swazo, 2002
A Bayes-optimal sequence-structure theory that unifies protein sequence-structure recognition and alignment
Lathrop R. H., Rogers Jr R. G., Smith T. F., 1998
A course in number theory and cryptography
Neal Koblitz, 1994
A Course in Number Theory and Cryptography
Neal Koblitz (auth.), 1987
A Course in Number Theory and Cryptography
Neal Koblitz (auth.), 1987
A Course in Number Theory and Cryptography
Neal Koblitz, 1994
Advances in Cryptology - ASIACRYPT 2003: 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 – December 4, 2003. Proceedings
Duong Hieu Phan, David Pointcheval (auth.), Chi-Sung Laih (eds.), 2003
Advances in Cryptology - ASIACRYPT 2008: 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings
Martin Hirt, Ueli Maurer, Vassilis Zikas (auth.), Josef Pieprzyk (eds.), 2008
Advances in Cryptology - ASIACRYPT’99: International Conference on the Theory and Application of Cryptology and Information Security, Singapore, November 14-18, 1999. Proceedings
Kenji Koyama, Yukio Tsuruoka, Noboru Kunihiro (auth.), Kwok-Yan Lam, Eiji Okamoto, Chaoping Xing (eds.), 1999
Advances in Cryptology - EUROCRYPT 2007: 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007. Proceedings
Marc Stevens, Arjen Lenstra, Benne de Weger (auth.), Moni Naor (eds.), 2007
Advances in Cryptology - EUROCRYPT 2009: 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings
Mihir Bellare, Dennis Hofheinz, Scott Yilek (auth.), Antoine Joux (eds.), 2009