Your search for 35753 returns 1108 document(s) |
Industrial applications for microprocessors/ A.D. Steckhahn |
Author: Steckhahn, A.D.; | Call Number: 629.804 3 Ste i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Different FDT's confronted with different ODP-viewpoints of the trader, (LNCS-Lecture Notes in Computer Science 670) Hal 332-350 |
Author: Joachim Fischer; Andreas Prinz; Andreas Vogel; | Call Number: 004 Woo f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secure e-business without boundaries |
Author: IBM; | Call Number: 004.125 | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secure e-business without boundaries |
Author: IBM; | Call Number: 004.125 | Type: Softcopy Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secure systems development with UML |
Author: Jurjens Jan; | Call Number: 005.117 Jur s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Designing Composite Triangular Subdivision Schemes, page 659-679 |
Author: P. Oswald | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Stationary Subdivision Schemes Reproducing Polynomials, page 351-360 |
Author: S. W. Choi, [et all] | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Jet Subdivision Schemes on the k-Regular Complex, page 361-396 |
Author: Y. Xue, [et all] | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Efficient Schemes For Broadcasting Popular Videos, page 284-294 |
Author: L. Gao, [et all] | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Data security through graphical authentication schemes, HAL. 1013-1024 |
Author: M.N. Djoja; Naveen Kumar; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|