نتایج جستجو

Image Processing in Radiology Current Applications
Thomas Bortfeld, Rupert Schmidt-Ullrich, Wilfried De Neve, David E. Wazer, 2005
Image Processing with LabVIEW and IMAQ Vision
Thomas Klinger, 2003
Image Processing with LabVIEW and IMAQ Vision
Thomas Klinger, 2003
Image Processing with LabVIEW and IMAQ Vision
Thomas Klinger, 2003
Recognizing Planar Objects Using Invariant Image Features
Thomas H. Reiss (eds.), 1993
Artificial Intelligence
Peggy Thomas, 2005
Bacteria and Viruses
Peggy Thomas, 2004
Advances in Cryptology — EUROCRYPT ’93: Workshop on the Theory and Application of Cryptographic Techniques Lofthus, Norway, May 23–27, 1993 Proceedings
Thomas Johansson, Gregory Kabatianskii, Ben Smeets (auth.), Tor Helleseth (eds.), 1994
Cryptographic Boolean Functions and Applications
Thomas W. Cusick, Pantelimon Stanica, 2009
Cryptographic Boolean Functions And Applications
Thomas W. Cusick, Pantelimon Stanica
Progress in Cryptology - INDOCRYPT 2003: 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003. Proceedings
Harald Niederreiter (auth.), Thomas Johansson, Subhamoy Maitra (eds.), 2003
RSA Security's official guide to cryptography
Jan Pelzl, Thomas Wollinger, Christof Paar (auth.), Mitsuru Matsui, Robert J. Zuccherato (eds.), 2001
Access 2002 Development Unleashed
Tom Howe, Paul Kimmel, Russ Mullen, Thomas Howe, 2001
Das Praxisbuch PostgreSQL 8 4 Edition
Thomas Pfeiffer, Andreas Wenk, 2010
Effective Oracle By Design
Thomas Kyte, 2003
Expert One-on-One Oracle
Thomas Kyte, 2003
Expert one-on-one Oracle
Thomas Kyte, 2001
Expert one-on-one Oracle
Thomas Kyte, 2001
FileNet: A Consultant's Guide to Enterprise Content Management
Todd R. Groff Thomas P. Jones, 2004
The Blackwell Guide to Kant's Ethics
Thomas Hill Jr., 2009
The Blackwell Guide to Kant's Ethics (Blackwell Guides to Great Works)
Thomas Hill Jr., 2009
Building Dmzs for Enterprise Networks
Thomas Shinder, 2001
Enterprise Knowledge Infrastructures
Ronald Maier, Thomas Hädrich, René Peinl, 2005