نتایج جستجو

Syntactic pattern recognition: an introduction
Rafael C. Gonzalez, Michael G. Thomason, 1978
Techniques and Applications of Digital Watermarking and Content Protection
Michael Arnold, Stephen D. Wolthusen, Martin Schmucker, 2003
Artificial Intelligence Today: Recent Trends and Developments
Ruth Aylett (auth.), Michael J. Wooldridge, Manuela Veloso (eds.), 1999
Artificial Intelligence Today: Recent Trends and Developments
Ruth Aylett (auth.), Michael J. Wooldridge, Manuela Veloso (eds.), 1999
Artificial Intelligence Today: Recent Trends and Developments
Ruth Aylett (auth.), Michael J. Wooldridge, Manuela Veloso (eds.), 1999
Artificial Intelligence: A Guide to Intelligent Systems
Michael Negnevitsky, 2004
Intelligent Virtual Agents: 6th International Conference, IVA 2006, Marina Del Rey, CA, USA, August 21-23, 2006. Proceedings
H. C. van Vugt, E. A. Konijn, J. F. Hoorn, J. Veldhuis (auth.), Jonathan Gratch, Michael Young, Ruth Aylett, Daniel Ballin, Patrick Olivier (eds.), 2006
Intelligent Virtual Agents: 9th International Conference, IVA 2009 Amsterdam, The Netherlands, September 14-16, 2009 Proceedings
Marilyn A. Walker (auth.), Zsófia Ruttkay, Michael Kipp, Anton Nijholt, Hannes Högni Vilhjálmsson (eds.), 2009
KI 2007: Advances in Artificial Intelligence: 30th Annual German Conference on AI, KI 2007, Osnabrück, Germany, September 10-13, 2007. Proceedings
Sahin Albayrak (auth.), Joachim Hertzberg, Michael Beetz, Roman Englert (eds.), 2007
Advances in Cryptology — ASIACRYPT 2001: 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9–13, 2001 Proceedings
Craig Gentry, Jakob Jonsson, Jacques Stern, Michael Szydlo (auth.), Colin Boyd (eds.), 2001
Advances in Cryptology — CRYPTO’ 99: 19th Annual International Cryptology Conference Santa Barbara, California, USA, August 15–19, 1999 Proceedings
Jean-Sébastien Coron, David Naccache, Julien P. Stern (auth.), Michael Wiener (eds.), 1999
Advances in Cryptology — EUROCRYPT ’96: International Conference on the Theory and Application of Cryptographic Techniques Saragossa, Spain, May 12–16, 1996 Proceedings
Don Coppersmith, Matthew Franklin, Jacques Patarin, Michael Reiter (auth.), Ueli Maurer (eds.), 1996
Cryptography and Coding: 7th IMA International Conference Cirencester, UK, December 20–22, 1999 Proceedings
Kenneth G. Paterson (auth.), Michael Walker (eds.), 1999
Kryptographie und IT-Sicherheit
Joachim Swoboda, Stephan Spitz, Michael Pramateftakis, 2008
Number Story: From Counting to Cryptography
Peter Michael Higgins, 2008
Number Story: From Counting to Cryptography
Peter Michael Higgins, 2008
Selected Areas in Cryptography: 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers
Shahram Khazaei, Simon Fischer, Willi Meier (auth.), Carlisle Adams, Ali Miri, Michael Wiener (eds.), 2007
Access 2002 bible
Cary N Prague; Michael R Irwin, 2001
Access 2010
Michael Kolberg, 2010
Access 2010 Bible
Michael R. Groh, 2010
Advanced ANSI SQL Data Modeling and Structure Processing
Michael M. David, 1999
Beginners Guide to SQL Server Integration Services Using Visual Studio 2005
Chris Leiter, Dan Wood, Michael Cierkowski, Albert Boettger, 2007
Beginning SQL Server 2000 DBA: From Novice to Professional
Tony Bain, Baya Pavliashvili, Joseph Sack, Michael Benkovich, Brian Freeman (auth.), 2004
Expert PL/SQL Practices: for Oracle Developers and DBAs
John Beresniewicz, Adrian Billington, Martin Büchi, Melanie Caffrey, Ron Crisco, Lewis Cunningham, Dominic Delmolino, Sue Harper, Torben Holm, Connor McDonald, Arup Nanda, Stephan Petit, Michael Rosenblum, Robyn Sands, Riyaj Shamsudeen (auth.), 2011