29185 |
|
Ding J., Schmidt D., Gower J.E. |
Multivariate Public Key Cryptosystems |
2006 | •• |
29186 |
|
Magid L., Collier A. |
MySpace Unraveled: A Parent's Guide to Teen Social Networking from the Directors of BlogSafety.com |
2006 | •• |
29193 |
|
Clemm A. |
Network Management Fundamentals |
2006 | •• |
29200 |
|
Spink A. (Ed), Cole Ch. (Ed) |
New Directions in Human Information Behavior |
2006 • | •• |
29201 |
|
Haykin S. (Ed), Sejnowski T.J. (Ed), McWhirter J. (Ed) |
New Directions in Statistical Signal Processing: From Systems to Brains |
2006 | •• |
29203 |
|
Fujita H. (Ed), Mejri M. |
New Trends in Software Methodologies, Tools and Techniques: Proceedings of the fifth SoMeT_06, Volume 147 Frontiers in Artificial Intelligence and Applications |
2006 | •• |
29204 |
|
Pandya M., Warner S., Brown J. |
Nightly Business Report Presents Lasting Leadership: What You Can Learn from the Top 25 Business People of our Times |
2006 | •• |
29205 |
|
Edwards J., Martin A., Bramante R. |
Nortel Guide to VPN Routing for Security and VoIP |
2006 | •• |
29222 |
|
Negus C. |
Live Linux CDs: Building and Customizing Bootables (Negus Live Linux Series) |
2006 | •• |
29228 |
|
Lau H.T. |
A Java Library of Graph Algorithms and Optimization |
2006 | •• |
29229 |
|
Ogunfunmi T. (Ed) |
Adaptive Nonlinear System Indentification: The Volterra and Wiener Model Approaches |
2006 • | •• |
29246 |
|
Meyers M. |
A+ Certification All-in-One Exam Guide |
2006 | •• |
29247 |
|
Trajkovski G., Idea Group Publishing |
Imitation-Based Approach to Modeling Homogenous Agents Societies |
2006 | •• |
29249 |
|
Mollin Richard a Staff, Mollin R.A. |
Introduction to Cryptography |
2006 • | •• |
29256 |
|
Kott A., McEneaney W. (ed.) |
Adversarial Reasoning: Computational Approaches to Reading the Opponents Mind |
2006 | •• |
29258 |
|
Kersting K. |
An Inductive Logic Programming Approach to Statistical Relational Learning: Volume 148 Frontiers in Artificial Intelligence and Applications |
2006 | •• |
29259 |
|
White T. |
Animation from Pencils to Pixels: Classical Techniques for the Digital Animator |
2006 | •• |
29263 |
|
Zha X.F. |
Artificial Intelligence and Integrated Intelligent Information Systems: Emerging Technologies and Applications |
2006 | •• |
29270 |
|
Isbister K. |
Better Game Characters by Design: A Psychological Approach |
2006 | •• |
29274 |
|
Eernisse M. |
Build Your Own AJAX Web Applications |
2006 | •• |
29303 |
|
Levitin G. (ed.) |
Computational Intelligence in Reliability Engineering: Evolutionary Techniques in Reliability Analysis and Optimization |
2006 | •• |
29306 |
|
Millis D.L. |
Computer Network Time Synchronization: The Network Time Protocol |
2006 | •• |
29317 |
|
Curtis K. |
Embedded Multitasking |
2006 | •• |
29324 |
|
Hassanaly P. (Ed), Herrmann T. (Ed), Kunau G. |
Cooperative Systems Design: Seamless Integration of Artifacts and Conversations - Enhanced Concepts of Infrastructure for Communication |
2006 | •• |
29331 |
|
Asama H. (Ed), Thrun S. (Ed), Prassler E. (Ed) |
Field and Service Robotics: Recent Advances in Reserch and Applications |
2006 | •• |
29332 |
|
Corke P. (Ed), Sukkarieh S. (Ed) |
Field and Service Robotics: Results of the 5th International Conference Fsr by Peter Corke (Editor), Salah Sukkarieh (Editor) |
2006 | •• |
29334 |
|
Lamont G.B., Van Veldhuizen D.A. |
Evolutionary Algorithms for Solving Multi-Objective Problems |
2006 • | •• |
29341 |
|
Ahlswede R., Blinovsky V., Cai N. (Ed) |
General Theory of Information Transfer and Combinatorics |
2006 | •• |
29347 |
|
Kanellis P. (Ed), Kiountouzis E. (Editor) |
Digital Crime and Forensic Science in Cyberspace |
2006 | •• |
29352 |
|
Rossi F. (Ed), Walsh T. (Ed), Van Beek P. |
Handbook of Constraint Programming |
2006 | •• |
29357 |
|
Lerner K.L. (ed.), Lerner B.W. (ed.) |
Crime and Punishment: Essential Primary Sources |
2006 | •• |
29367 |
|
Bandyopadhyay S., Roy S., Ueda T. |
Enhancing the Performance of Ad Hoc Wireless Networks with Smart Antennas |
2006 | •• |
29381 |
|
Al-Hakim L. |
Information Quality Management: Theory and Applications |
2006 | •• |
29382 |
|
Krause M. |
Information Security Management Handbook, Volume 3 |
2006 • | •• |
29393 |
|
Stahl B.C.C. |
Issues and Trends in Technology and Human Interaction |
2006 | •• |
29396 |
|
Zlolniski C. |
Janitors, Street Vendors, and Activists - the Lives of Mexican Immigrants in Silicon Valley |
2006 | •• |
29397 |
|
Woods D., Hollnagel E. |
Joint Cognitive Systems: Patterns in Cognitive Systems Engineering |
2006 | •• |
29401 |
|
Gottschalk P. |
Knowledge Management Systems: Value Shop Creation |
2006 | •• |
29402 |
|
van Engers T.M. |
Legal Knowledge and Information Systems: JURIX 2006 - the Nineteenth Annual Conference |
2006 | •• |
29403 |
|
Brameier M., Banzhaf W. |
Linear Genetic Programming |
2006 | •• |
29414 |
|
De Clercg J., Grillenmeier G. |
Microsoft Windows Security Fundamentals: For Windows 2003 SP1 and R2 |
2006 | •• |
29423 |
|
Yeung R.W., Li S.-Y., Cai N. |
Network Coding Theory |
2006 | •• |
29428 |
|
Calero C. (ed.), Ruiz F. (ed.), Piattini M. (ed.) |
Ontologies in Software Engineering and Software Technology |
2006 | •• |
29434 |
|
Vallath M. |
Oracle 10g RAC: Grid, Services and Clustering |
2006 | •• |
29437 |
|
Powell G. |
Oracle Performance Tuning for 10gR2 |
2006 • | •• |
29438 |
|
Eales S. |
Origins: How the Planets, Stars, Galaxies, and the Universe Begane |
2006 | •• |
29440 |
|
Schneiderjans M.J. |
Outsourcing Management Information Systems |
2006 | •• |
29442 |
|
Bhattacharya A., Konar A., Mandal A.K. |
Parallel and Distributed Logic Programming: Towards the Design of a Framework for the Next Generation Database Machines |
2006 | •• |
29443 |
|
Nedjah N. (ed.) |
Parallel Evolutionary Computations |
2006 | •• |
29444 |
|
Flum J., Grohe M. |
Parameterized Complexity Theory |
2006 | •• |