29387 |
|
Jensen J.F. |
Interactive TV: A Shared Experience: 5th European Conference, Euroitv 2007, Amsterdam, the Netherlands, May 24-25, 2007, Proceedings |
2007 | •• |
29386 |
|
Shih T.K. (ed.), Wang P.P. (ed.) |
Intelligent Virtual World: Technologies and Applications in Distributed Virtual Environment |
2004 | •• |
29385 |
|
Klopotek M.A. (ed.), Weirzchon S.T., Trojanowski K. (ed.) |
Intelligent Information Processing and Web Mining: Proceedings of the International Iis: Iipwm´05 Conference Held in Gdansk, Poland, June 13-16 2005 |
2005 | •• |
29384 |
|
Chorafas D.N. |
Integrating Erp, Crm, Supply Chain Management, and Smart Materials |
2001 | •• |
29383 |
|
Gallager R.G. |
Information Theory and Reliable Communication |
1968 | •• |
29382 |
|
Krause M. |
Information Security Management Handbook, Volume 3 |
2006 • | •• |
29381 |
|
Al-Hakim L. |
Information Quality Management: Theory and Applications |
2006 | •• |
29380 |
|
Jaakkola H. (ed.), Kiyoki Y. (ed.) |
Information Modelling and Knowledge Bases XV, Vol. 105 |
2004 | •• |
29379 |
|
Raisanen V. |
Implementing Service Quality in IP Networks |
2003 | •• |
29378 |
|
Camacho R. (ed.), King R. (ed.), Srinivasan A. (ed.) |
Inductive Logic Programming: 14th International Conference, ILP 2004, Porto, Portugal, September 6-8, 2004, Proceedings |
2004 | •• |
29377 |
|
Ben-Natan R. |
Implementing Database Security and Auditing |
2005 | •• |
29376 |
|
Natsuno T. |
I-Mode Strategy |
2003 | •• |
29375 |
|
Thomas S.A. |
HTTP Essentials |
2001 | •• |
29374 |
|
Smith B., Keegan L., Guzzetta C.E. |
Holistic Nursing: A Handbook for Practice |
2004 • | •• |
29373 |
|
Loosley C., Douglas F. |
High-Performance Client-Server |
1997 | •• |
29372 |
|
National Research Council |
Government Data Centers: Meeting Increasing Demands |
2003 | •• |
29371 |
|
Charnes J. |
Financial Modeling with Crystal Ball and Excel |
2007 | •• |
29370 |
|
Last M. (ed.), Kandel A. (ed.) |
Fighting Terror in Cyberspace |
2005 | •• |
29369 |
|
Boccara N. |
Essentials of Mathematica: With Applications to Mathematics and Physics |
2007 | •• |
29368 |
|
Csiszar I. |
Entropy, Search, Complexity |
2007 | •• |
29367 |
|
Bandyopadhyay S., Roy S., Ueda T. |
Enhancing the Performance of Ad Hoc Wireless Networks with Smart Antennas |
2006 | •• |
29366 |
|
Kacsuk P. (ed.), Fahringer T. (ed.), Nemeth Z. (ed.) |
Distributed and Parallel Systems: From Cluster to Grid Computing |
2007 | •• |
29365 |
|
Brooks R.R., Gallo F.P. |
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks |
2004 | •• |
29364 |
|
Henkel J. (ed.), Parameswaran S. (ed.) |
Designing Embedded Processors: A Low Power Perspective |
2007 | •• |
29363 |
|
Drozdek A. |
Data Structures and Algorithms in C++ |
2000 | •• |
29362 |
|
Gardner H., Manduchi G. |
Design Patterns for E-Science |
2007 | •• |
29361 |
|
Ponniah P. |
Data Modeling Fundamentals |
2007 | •• |
29360 |
|
Matignon R. |
Data Mining Using SAS Enterprise Miner |
2007 | •• |
29359 |
|
Conejo R. (ed.), Urretavizcaya M. (ed.) |
Current Topics in Artificial Intelligence |
2004 | •• |
29358 |
|
Hyslop M. |
Critical Information Infrastructures: Resilience and Protection |
2007 | •• |
29357 |
|
Lerner K.L. (ed.), Lerner B.W. (ed.) |
Crime and Punishment: Essential Primary Sources |
2006 | •• |
29356 |
|
McCrary S.A. |
Hedge Fund Course (Wiley Finance Series) |
2005 | •• |
29355 |
|
Basham B., Sierra K., Bates B. |
Head First Servlets & JSP: Passing the Sun Certified Web Component Developer Exam |
2004 • | •• |
29354 |
|
Thalmann D. |
Handbook of Virtual Humans |
2004 | •• |
29353 |
|
Cucker F., Ciarlet P.G. (Ed) |
Handbook of Numerical Analysis: Special Volume: Foundations of Computational Mathematics |
2003 | •• |
29352 |
|
Rossi F. (Ed), Walsh T. (Ed), Van Beek P. |
Handbook of Constraint Programming |
2006 | •• |
29351 |
|
Sinchak S. |
Hacking Windows Vista |
2007 | •• |
29350 |
|
Kolle I.C. |
Graphics Tablet Solutions |
2001 • | •• |
29349 |
|
Buchanan L., Schell A. (Ed), Buchanan L. |
Graphically Speaking: A Visual Lexicon For Achieving Better Designer-Client Communication |
2002 • | •• |
29348 |
|
Schenker A., Bunke H., Last M. |
Graph-Theoretic Techniques For Web Content Mining |
2005 | •• |
29347 |
|
Kanellis P. (Ed), Kiountouzis E. (Editor) |
Digital Crime and Forensic Science in Cyberspace |
2006 | •• |
29346 |
|
McMillan M. |
Data Structures and Algorithms in C# |
2007 | •• |
29345 |
|
Coombs T., DeLeon R. |
Google Power Tools Bible |
2007 | •• |
29344 |
|
Barton R. |
Global IT Management - a Practical Approach |
2003 | •• |
29343 |
|
Vince J. |
Geometry for Computer Graphics |
2004 | •• |
29342 |
|
Riolo R. (Ed.), Soule T. (Ed.), Worzel B. (Ed) |
Genetic Programming Theory and Practice IV |
2007 | •• |
29341 |
|
Ahlswede R., Blinovsky V., Cai N. (Ed) |
General Theory of Information Transfer and Combinatorics |
2006 | •• |
29340 |
|
Williams Ch. |
Gaussian Processes for Machine Learning |
2005 | •• |
29339 |
|
Xie M. |
Fundamentals of Robotics: Linking Perception to Action |
2003 | •• |
29338 |
|
Lewis D.W. |
Fundamentals of Embedded Software: Where C and Assembly Meet |
2001 • | •• |