2941. |
Doucet J. Weber J. |
Computer-Aided Molecular Design: Theory and Applications | 1996 |
2942. |
Dowek G. Heering Ою Meinke K. |
Higher-Order Algebra, Logic, and Term Rewriting: Second International Workshop, HOA '95, Paderborn, Germany, September 1995. Selected Papers | 1996 |
2943. |
Downey A. Elkner J. Meyers C. |
How to Think Like a Computer Scientist. Learning with Python | 2002 |
2944. |
Downey A.B. Elkner J. |
How to think like a computer scientist | 2001 |
2945. |
Downey A.B. |
How to Think Like a Computer Scientist. Learning with C++ | 2002 |
2946. |
Downing D. Covington M. Covington M. |
Dictionary of Computer and Internet Terms (10 edition) | 2009 |
2947. |
Doyle M. |
Beginning PHP 5.3 | 2009 |
2948. |
Doyle M. |
Beginning PHP 5.3 (Wrox Programmer to Programmer) | 2010 |
2949. |
Dr.Granito F. |
Digital transformation demystified | n/a |
2950. |
Draheim D. |
Trends in Enterprise ApplicationArchitecture: 2nd International Conference, TEAA 2006 Berlin, Germany, November 29 - December 1, 2006 Revised Selected Papers | 2007 |
2951. |
Dress A. (ed.) Xu Y. (ed.) Zhu B. (ed.) |
Combinatorial Optimization and Applications. First International Conference, COCOA 2007 Xi’an, China, August 14-16, 2007 Proceedings | 2007 |
2952. |
Dreyfus G. |
Neural Networks: Methodology and Applications | 2005 |
2953. |
Dreyfus H. |
What Computers Can't Do: The Limits of Artificial Intelligence | 1972 |
2954. |
Dreyfus S. Law A. |
The art and theory of dynamic programming | 1977 |
2955. |
Drinfeld V.G. Manin Yu.I. |
Description of instantons | 1978 |
2956. |
Drmac Z. (ed.) Tutek Z. (ed.) Marusic M. (ed.) |
Proceedings of the Conference on Applied Mathematics and Scientific Computing | 2005 |
2957. |
Drossopoulou S. |
Programming Languages and Systems, 17 conf., ESOP 2008 | 2008 |
2958. |
Drossos L. |
Digital rights management for e-commerce systems | 2009 |
2959. |
Drozdowski M. |
Scheduling for Parallel Processing (Computer Communications and Networks) (2nd edition) | 2009 |
2960. |
Druschel P. Kaashoek F. Rowstron A. |
Lecture Notes in Computer Science (2429). Peer-to-Peer Systems | 2002 |
2961. |
Drusinsky D. |
Modeling and Verification Using UML Statecharts: A Working Guide to Reactive System Design, Runtime Monitoring and Execution-based Model Checking | 2006 |
2962. |
Dryden I.L. Mardia K.V. |
Statistical Shape Analysis | 1998 |
2963. |
Du D. (ed.) Pardalos P. (ed.) |
Handbook of combinatorial optimization: supplement volume A | 1999 |
2964. |
Du D.-Z. Hu X. |
Combinatorial Optimization and Applications: Third International Conference, COCOA 2009, Huangshan, China, This book constitutes the refereed proceedings of the Third International Conference on Combinatorial Optimization and Applications, COCOA 2009, hel | 2009 |
2965. |
Du W. Ensan F. |
Canadian Semantic Web: Technologies and Applications | 2010 |
2966. |
Dube R. |
Hardware based Computer Security Techniques to Defeat Hackers | 2008 |
2967. |
Dube R.R. |
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography | 2008 |
2968. |
Dubois E. Gray P. Nigay L. |
The Engineering of Mixed Reality Systems (Human-Computer Interaction Series) | 2010 |
2969. |
Duch W. Kacprzyk J. Oja E. |
Artificial Neural Networks: Biological Inspirations – ICANN 2005. 15th International Conference. Warsaw, Poland, September 11-15, 2005. Proceedings, Part I (Lecture Notes in Computer Science 3696) | 2005 |
2970. |
Duck M. Read R. |
Data Communications and Computer Networks: For Computer Scientists and Engineers (2nd edition) | 2003 |
2971. |
Duckett J. |
Beginning Web Programming with HTML, XHTML, and CSS (2-nd edition) | 2008 |
2972. |
Dudney B. |
Core Animation for Mac OS X and the iPhone: Creating Compelling Dynamic User Interfaces | 2008 |
2973. |
Duff I.S. Erisman A.M. Reid J.K. |
Direct Methods for Sparse Matrices | 1989 |
2974. |
Duffett-Smith P. |
Astronomy with your personal computer (2nd edition) | 1990 |
2975. |
Duffy D.J. |
Financial Instrument Pricing Using C++ | 2004 |
2976. |
Duffy J. |
Concurrent Programming on Windows | 2008 |
2977. |
Duffy V.D. |
Digital Human Modeling: First International Conference, ICDHM 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings | 2007 |
2978. |
Duke D.J. Herman I. Marshall M.S. |
PREMO: A Framework for Multimedia Middleware: Specification, Rationale, and Java Binding | 1999 |
2979. |
Dukish B. |
Digital Electronics with Arduino | 2020 |
2980. |
Dulaney E. Pastore M. |
Security+, Study Guide (Second edition) | 2004 |
2981. |
Dumke R. Abran A. |
New Approaches in Software Measurement | 2001 |
2982. |
Dunham C.B. |
Convergence Problems in Maehlys Second Method | 1965 |
2983. |
Dunham C.B. |
Convergence Problems in Maehlys Second Method. Part II | 1966 |
2984. |
Dunkelman O. (ed.) |
Fast Software Encryption: 16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009 Revised Selected Papers | 2009 |
2985. |
Dunne R. |
Computers and the law: an introduction to basic legal principles and their application in cyberspace | 2009 |
2986. |
Dunnweber J. Gorlac S. |
Higher-order components for grid programming making grids more usable (1 edition) | 2009 |
2987. |
Duparc J. |
Computer Science Logic: 21 International Workshop, CSL 2007, 16th Annual Conference of the EACSL, Lausanne, Switzerland, September 11-15, 2007, Proceedings | 2007 |
2988. |
Durrance J.C. Pettigrew K.E. |
Online Community Information: Creating a Nexus at Your Library | 2002 |
2989. |
Dutoit A.H. McCall R. Mistrík I. |
Rationale management in software engineering | 2006 |
2990. |
Dutta S. Mia I. |
The Global Information Technology Report 2007-2008: Fostering Innovation through Networked Readiness (1 edition) | 2010 |
2991. |
Duzi M. (Ed) Jaakkola H. (Ed) |
Information Modelling and Knowledge Bases XVIII - Volume 154 Frontiers in Artificial Intelligence and Applications | 2007 |
2992. |
Dwarkadas S. |
Languages, Compilers, and Run-Time Systems for Scalable Computers | 2000 |
2993. |
Dwivedi Y. |
Handbook of Research on Contemporary Theoretical Models in Information Systems | 2009 |
2994. |
Dwork C.(ed.) |
Advances in Cryptology - CRYPTO 2006: 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings (1 edition) | 2006 |
2995. |
Dybjer P. Smith J. |
Types for Proofs and Programs: International Workshop TYPES '94, Bastad, Sweden, June 6-10, 1994. Selected Papers | 1995 |
2996. |
Dybvig R.K. |
The Scheme Programming Language (3rd edition) | 2003 |
2997. |
Dyckhoff R. |
Automated Reasoning with Analytic Tableaux and Related Methods, TABLEAUX 2000 (1 edition) | 2000 |
2998. |
Dyckhoff R. Herre H. Schroeder-Heister P. |
Extensions of Logic Programming: 5th International Workshop, ELP '96, Leipzig, Germany, March 28 - 30, 1996. Proceedings | 1996 |
2999. |
Dyer-Witheford N. |
Cyber-Marx: Cycles and Circuits of Struggle in High Technology Capitalism | 1999 |
3000. |
Dyson P. Longshaw A. |
Architecting Enterprise Solutions: Patterns for High-Capability Internet-based Systems | 2004 |
3001. |
Dzeroski S. |
Inductive Logic Programming: 9th International Workshop, ILP-99, Bled, Slovenia, June 24-27, 1999, Proceedings: International Workshop, ILP-99, Bled, ... 9th | 1999 |
3002. |
E. Bin A. Ziv |
Hardware and Software, Verification and Testing: Second International Haifa Verification Conference, HVC 2006, Haifa, Israel, October 23-26, 2006, Revised ... Papers (Lecture Notes in Computer Science) | 2007 |
3003. |
E. Brown |
Web Development with Node and Express | 2020 |
3004. |
E. CantPaz J. A. Foster |
Genetic and Evolutionary Computation - GECCO 2003: Genetic and Evolutionary Computation Conference, Chicago, IL, USA, July 12-16, 2003, Proceedings, Part I | 2003 |
3005. |
E. V. Valkenburg |
Reference Data for Engineers - Radio, Electronics, Computer, etc (9 edition) | 2001 |
3006. |
Eady F. |
Hands-On ZigBee: Implementing 802.15.4 with Microcontrollers | 2007 |
3007. |
Eason K.D. |
Information Technology And Organisational Change | 1989 |
3008. |
Easterbrook S. |
Cscw: Cooperation or Conflict? (Computer Supported Cooperative Work) | 1993 |
3009. |
Easttom C. Taylor D.J. |
Computer Crime, Investigation, and the Law | 2011 |
3010. |
Eberspaecher J. |
GSM: architecture, protocols and services (3rd edition) | 2009 |