40290 |
|
De Gonzalez A.B. |
Additive and multiplicative models for the joint effect of two risk factors |
2005 | •• |
40296 |
|
United Nations Environment Programme Staf |
After the Tsunami: Rapid Environmental Assessment |
2005 | •• |
28683 |
|
Zhou J. (Ed) |
Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005 |
2005 | •• |
28689 |
|
Walton D.N. |
Argumentation Methods for Artificial Intelligence and Law |
2005 | •• |
28692 |
|
Goertzel B. (Ed), Pennachin C. (Ed) |
Artificial General Intelligence |
2005 | •• |
28693 |
|
Kim T.G. (Ed) |
Artificial Intelligence and Simulation |
2005 | •• |
28697 |
|
Looi Ch.- K. |
Artificial Intelligence in Education: Supporting Learning through Intelligent and Socially Informed Technology |
2005 | •• |
28700 |
|
Dubitzky W. (Ed), Azuaje F. (Ed) |
Artificial Intelligence Methods and Tools for Systems Biology |
2005 | •• |
28708 |
|
Bromme R. (Ed), Spada H. (Ed), Hesse F.W. (Ed) |
Barriers and Biases in Computer-Mediated Knowledge Communication: And how They May Be Overcome |
2005 | •• |
28723 |
|
ElMaraghi H.A. (ed.), ElMaraghi W.H. (ed.) |
Advances in Design |
2005 | •• |
28725 |
|
Magoulas G.D. (ed.), Chen S.Y. (ed.) |
Advances in Web-based Education |
2005 | •• |
28727 |
|
Bonoli G. |
Ageing And Pension Reform Around The World |
2005 | •• |
28741 |
|
Gosney J.W. |
Beyond Reality |
2005 | •• |
28742 |
|
Marchetti A.M. |
Beyond Sarbanes-Oxley compliance |
2005 | •• |
28747 |
|
Chen Y.-P.P. |
Bioinformatics Technologies |
2005 | •• |
28749 |
|
Vielhauer C. |
Biometric User Authentication for IT Security: From Fundamentals to Handwriting |
2005 | •• |
28751 |
|
Bar-Cohen Y. |
Biomimetics: Biologically Inspired Technologies |
2005 | •• |
28757 |
|
Barbaro G. (Ed), Boccara F. (Ed) |
Cardiovascular Disease in Aids |
2005 | •• |
28760 |
|
Raviele A. (Ed) |
Cardiac Arrhythmias 2005 |
2005 • | •• |
28785 |
|
Armada M. (Ed), de Santos P.G. (Ed) |
Climbing and Walking Robots: Proceedings of the 7th International Conference Clawar 2004 |
2005 • | •• |
28786 |
|
Biglieri E. |
Coding For Wireless Channels (Information Technology Series: Transmission, Processing, and Storage) |
2005 • | •• |
28788 |
|
Lullmann M. |
Color Atlas of Pharmacology |
2005 • | •• |
28794 |
|
Camarinha-Matos L.M. (Ed), Afsarmanesh H. (Ed), Ortiz A. (Ed) |
Collaborative Networks and Their Breeding Environments |
2005 • | •• |
28795 |
|
Dick S., Kandel A. (Ed) |
Computational Intelligence in Software Quality Assurance |
2005 | •• |
28797 |
|
Popovic D., Palit A.K. |
Computational Intelligence in Time Series Forecasting: Theory and Engineering Applications |
2005 • | •• |
28807 |
|
Abraham W. |
Chinese Phrases For Dummies |
2005 | •• |
28808 |
|
Ghazala R. |
Circuit-bending |
2005 | •• |
28816 |
|
Negoita M., Neagu D., Palade V. |
Computational Intelligence: Engineering of Hybrid Systems |
2005 | •• |
28817 |
|
Konar A. |
Computational Intelligence |
2005 | •• |
28822 |
|
Filiol E. |
Computer Viruses: from theory to applications |
2005 | •• |
28826 |
|
Sebesta R.W. |
Concepts of Programming Languages |
2005 • | •• |
28828 |
|
Cruz J. |
Constraint Reasoning for Differential Models |
2005 | •• |
28830 |
|
Kelly R., Santibanez V., Loria A. |
Control of Robot Manipulators in Joint Space |
2005 | •• |
28836 |
|
Wierzbicki A.P., Nakamori Y. |
Creative Space: Models of Creative Processes for the Knowledge Civilization Age |
2005 | •• |
28843 |
|
Goodman D. |
Danny Goodman's AppleScript Handbook |
2005 • | •• |
28868 |
|
Kim G.J. |
Building Virtual Reality Systems: The Structured Approach |
2005 | •• |
28872 |
|
Jdhne B. |
Digital Image Processing: Concepts, Algorithms, and Scientific Applications |
2005 • | •• |
28873 |
|
Seitz J. |
Digital Watermarking for Digital Media |
2005 | •• |
28887 |
|
Gabrys B. (Ed), Leiviska K., Strackeljan J. |
Do Smart Adaptive Systems Exist?: Best Practice for Selection and Combination of Intelligent Methods |
2005 • | •• |
28894 |
|
Gottschalk P. |
E-Business Strategy, Sourcing, and Governance |
2005 | •• |
28902 |
|
Schwartz D.G. (Ed) |
Encyclopedia of Knowledge Management, Vol. 1 |
2005 | •• |
28907 |
|
Puder A., Romer K., Pilhofer F. |
Distributed Systems Architecture: A Middleware Approach |
2005 | •• |
28910 |
|
Marwedel P. |
Embedded System Design |
2005 | •• |
28929 |
|
Zdziarski J. |
Ending Spam: Bayesian Content Filtering and the Art of Statistical Language Classification |
2005 | •• |
28932 |
|
Aurum A., Wohlin C. |
Engineering and Managing Software Requirements |
2005 | •• |
28933 |
|
Vemuri V.R.R., Hari R.V.S. |
Enhancing Computer Security with Smart Technology |
2005 | •• |
28937 |
|
Maier R., Hadrich T., Peinl R. |
Enterprise Knowledge Infrastructures |
2005 | •• |
28938 |
|
Meier M., Mertens P., Sinzig W. |
Enterprise Management with SAP SEM/ Business Analytics |
2005 | •• |
28941 |
|
Betten A., Kerber A., Braun M. |
Error-Correcting Linear Codes |
2005 | •• |
28949 |
|
Higuchi T. (ed.), Liu Y. (ed.), Yao X. (ed.) |
Evolvable Hardware |
2005 | •• |