Search Result Save to File Save as CSV
Your search for 38750 returns 2947 document(s)
Hybrid systems described by the complementarity formalism, (LNCS-Lecture Notes in Computer Science 1201) Hal 403-408
Author: A. J. van der Schaft; J. M. Schumacher; | Call Number: 004.33 Mal h | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Computer Languages
Call Number: [1 (1975): 1-4, 2 (1976): 1-4, 2 (1976): 1-4, 4 (1979): 1-4, 4 (1982): 1-4, 11 (1986): 1-4, 14 (1989): 1, 12 (1987): 1-4, 13 (1988): 1-4, 14 (1989): 1, 22 (1996): 1-4, 20 (1985): 1-4] | Type: Jurnal/ Majalah
Find Similar |  Add To Favorites |  Detail in New Window 
From all possible worlds to small worlds: A story of how we (hal 1 - 18)
Author: Kiyong Lee; | Call Number: SEM-308 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Relating high-level and low-level action descriptions in a logic of actions and change, (LNCS-Lecture Notes in Computer Science 1201) Hal 3-17
Author: Erik Sandewall; | Call Number: 004.33 Mal h | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Control synthesis for a class of hybrid systems subject to configuration-based safety constraints, (LNCS-Lecture Notes in Computer Science 1201) Hal 376-390
Author: Michael Heymann; Feng Lin; George Meyer; | Call Number: 004.33 Mal h | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Generalized linear complementarity problems and the analysis of continuously variable systems and discrete event systems,(LNCS-Lecture Notes in Computer Science 1201) Hal 409-414
Author: Bart De Schutter; Bart De Moor; | Call Number: 004.33 Mal h | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
How ethics can enhance organizational privacy: lessons from the choicePoint and TJX data breaches, page 673-687
Author: Mary J. Culnan and Cynthia Clark Williams | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Cyber tigers: how companies in Asia can prosper from E-commerce/James K. Ho
Author: Ho, James K.; | Call Number: 658.002 85 Ho c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Programming Languages: From Algol to Polymorphic Linear Lambda-Calculus
Author: P. W. O'Hearn, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
On conceptual modelling: perspectives from artificial intelligence, databases, and programming languages
Call Number: 006.3 Onc | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   4 5 6 7 8 9 10 11 12 13  Next