Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
Мехматянам
square Первый курс

square Второй курс

square Третий курс

square Четвертый курс

square Пятый курс
blank
Авторизация

       
blank
Поиск по указателям

blank
Красота
blank
blank
Каталог
Всего ресурсов: 194904
parent directoryНа уровень выше
dirAI, knowledge (102 / 102)
dirАлгоритмы (91 / 91)
dirБиоинформатика (22 / 22)
dirКомпьютерная алгебра (19 / 19)
dirВычислительная геометрия (28 / 28)
dirКриптография (11 / 11)
dirДискретная математика (41 / 41)
dirГенетика, нейронные сети (32 / 32)
dirТеория информации (20 / 20)
dirОбработка изображений (59 / 59)
dirВычислимость (35 / 35)
dirЯзыки программирования (180 / 180)
dirПопулярные издания (2 / 2)
dirКвантовые вычисления (23 / 23)


» Computer science »

blank
Содержимое каталога
5251. Nauck D. Data Analysis with Neuro-Fuzzy Methods2000
5252. Nault C.L. Risk-Free Technology: How Small to Medium Businesses Can Stem Huge Losses From Poorly Performing IT Systems2009
5253. Navia J. Dominicus F. Advanced programming with lcc-win322004
5254. Nazareth J.L. The Newton-Cauchy Framework.. A Unified Approach to Unconstrained Nonlinear Minimization (1 edition)1994
5255. Neapolitan R.E. Learning Bayesian networks2003
5256. Neatby W.B. The Programme of the Jesuits2010
5257. Neder R.B. Proffen T. Diffuse Scattering and Defect Structure Simulations: A Cook Book Using the Program DISCUS (International Union of Crystallography Monographs on Crystallography) (Har/Cdr edition)2009
5258. Nedjah N. Evolvable Machines: Theory and Practice2004
5259. Nedjah N. Fuzzy Systems Engineering2005
5260. Nedjah N. Abraham A. (Ed) de Macedo Mourelle L. (Ed) Genetic Systems Programming: Theory and Experiences2006
5261. Nedjah N. Mourelle L.M. Swarm Intelligent Systems2006
5262. Nedjah N. (ed.) Abraham A. (ed,) De Mourelle L. (ed.) Computational Intelligence in Information Assurance and Security2007
5263. Nedjah N. (ed.) de Macedo Mourelle L. (ed.) Kacprzyk J. (ed.) Innovative Applications in Data Mining2009
5264. Nedjah N. (ed.) Parallel Evolutionary Computations2006
5265. Neelakanta P.S. Degroff D. Neural Network Modeling: Statistical Mechanics and Cybernetic Perspectives (1st edition)1994
5266. Negm-Awad A. Objective-C und Cocoa - Band 1. Grundlagen2008
5267. Negoita M. Neagu D. Palade V. Computational Intelligence: Engineering of Hybrid Systems2005
5268. Negoita M.G. (Ed) Reusch B. (Ed) Real World Applications of Computational Intelligence (1st edition)2005
5269. Negrotti M. Naturoids: On the Nature of the Artificial2003
5270. Nejdl W.(ed.) Bra P.D.(ed.) Adaptive Hypermedia and Adaptive Web-Based Systems: Third International Conference, AH 2004, Eindhoven, The Netherlands, August 23-26, 2004, Proceedings (Lecture Notes in Computer Science) (1 edition)2004
5271. Nejdl W.(Editor) Kay J. (Editor) Pu P. (Editor) Adaptive Hypermedia and Adaptive Web-Based Systems: 5th International Conference, AH 2008, Hannover, Germany, July 29 - August 1, 2008, Proceedings (1 edition)2008
5272. Nemeth E. Linux administration handbook (2 edition)2006
5273. Nerode A. Taitslin M. Logical Foundations of Computer Science, LFCS '921992
5274. Nesbeitt S.L. Gordon R.S. The Information Professional's Guide to Career Development Online2002
5275. Nesterov Y. Nemirovskii A. Interior-Point Polynomial Algorithms in Convex Programming1994
5276. Neto F. Brasileiro F. Advances in Computer-Supported Learning2007
5277. Neubauer A. Freudenberger J. Kuhn V. Coding Theory: Algorithms, Architectures and Applications (1st edition)2007
5278. Neuenschwander D. Probabilistic and Statistical Methods in Cryptology (1 edition)2004
5279. Neufeld G.G. Immers R. Inside Commodore DOS1986
5280. Neulander J. Programming National Identity: The Culture of Radio in 1930s France2010
5281. Neumann P.G. Computer-Related Risks1994
5282. Neurauter T. Sammlung und Erklärungen zu Computergraphikn/a
5283. Neveln B. Linux Assembly Language Programming2000
5284. Neves J.M. Santos M.F. Machado J.M. Progress in Artificial Intelligence, 13 conf., EPIA 2007 (1 edition)2007
5285. Neward T. Erickson A. Crowell T. Professional F# 2.02011
5286. Neward T. Server-Based Java Programming2000
5287. Newborn M. Computer Chess (A.C.M. monograph series)1975
5288. Newton D. E. Olendorf D. Jeryan C. Sick . U.X.L Complete Health Resource. Volume 1 (1 edition)2000
5289. Newton D. E. Olendorf D. Jeryan C. U.X.L Complete Health Resource. Sick 4 (1 edition)2000
5290. Newton J. Computers in Translation: A Practical Appraisal1992
5291. Ney H. Mustererkennung und Neuronale Netze1995
5292. Ng W.S. Ooi B.C. Ouksel A. Databases, Information Systems, and Peer-to-Peer Computing: Second International Workshop, DBISP2P 2004, Toronto, Canada, August 29-30, 2004, Revised2005
5293. Ngoc Thanh Nguyen (Author, Editor) Lakhmi C. Jain (Editor) Intelligent Agents in the Evolution of Web and Applications (1 edition)2009
5294. Nguyen N. Kowalczyk R. Transactions on Computational Collective Intelligence I (Lecture Notes in Computer Science Transactions on Computational Collective Intelligence)2010
5295. Nguyen N.-T. Katarzyniak R Advances in Intelligent Information and Database Systems2010
5296. Nguyen N.T. Grzech A. Howlett R.J. Agent and Multi-Agent Systems: Technologies and Applications: First KES International Symposium, KES-AMSTA 2007, Wroclaw, Poland, May 31-June 1, 2007, Proceedings (Lecture Notes in Computer Science)2007
5297. Nguyen N.T. (ed.) Grzech A. (ed.) Howlett R.J. (ed.) Agent and multi-agent systems. Technologies and applications. Lecture notes in artificial intelligence 44962007
5298. Nguyen N.T. (ed.) Jo G.S. (ed.) Howlett R.J. (ed.) Agent and multi-agent systems. Technologies and applications. Lecture notes in artificial intelligence 49532008
5299. Nguyen P.Q.(ed.) Pointcheval D.(ed.) Lecture Notes in Computer Science (6056). Public Key Cryptography - PKC 2010: 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010, Proceedings2010
5300. Nguyen Ph.Q. (Editor) Progress in Cryptology - VIETCRYPT 2006: First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006 (1 edition)2007
5301. Nicholson D.W. Finite Element Analysis: Thermomechanics of Solids (1 edition)2003
5302. Nicola R. Programming Languages and Systems, 16 conf., ESOP 20072007
5303. Niedermeier R. Invitation to Fixed Parameter Algorithms2006
5304. Niedermeier R. Parametrisierte Algorithmen1999
5305. Niedermeier R. Randomisierte Algorithmen1997
5306. Niederreiter H.(ed.) Talay D.(ed.) Monte Carlo and Quasi-Monte Carlo Methods (1 edition)2006
5307. Nielsen F. A Concise And Practical Introduction To Programming Algorithms In Java2009
5308. Nielsen M. Engberg U. Foundations of Software Science and Computation Structures: 5th International Conference, FOSSACS 2002. Held as Part of the Joint European Conferences ...2002
5309. Nielsen M. Kucera A. Miltersen P.B. Lecture Notes in Computer Science (5404). SOFSEM 2009: Theory and Practice of Computer Science2009
5310. Nielsen M. Hartmains J. Olsen O.F. (eds.) Scale-Space Theories in Computer Vision1999
5311. Niemeegers I. Heemstra de Groot S. Personal Wireless Communications, 2004 (1 edition)2004
5312. Niemeyer G. Poteet J. Extreme Programming with Ant: Building and Deploying Java Applications with JSP, EJB, XSLT, XDoclet, and JUnit2003
5313. Niemiec R. Oracle Database 10g Performance Tuning Tips & Techniques2008
5314. Nienhuys-Cheng S. Wolf R. Foundations of Inductive Logic Programming (1 edition)1997
5315. Nierstrasz O. Lemoine M. Software Engineering - ESEC/FSE '99: 7th European Software Engineering Conference Held Jointly with the 7th ACM SIGSOFT Symposium on the Foundations ...1999
5316. Nieuwenhuis R. Voronkov A. Logic for Programming, Artificial Intelligence, and Reasoning: 8th International Conference, LPAR 2001, Havana, Cuba, December 3-7, 2001, Proceedings2001
5317. Nievergelt J. Farrar J.C. Reingold E.M. Computer approaches to mathematical problems1974
5318. Nigel Smart (Editor) Advances in Cryptology EUROCRYPT 2008: 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, ... (1 edition)2008
5319. Nigro H.O. Cisaro S.G. Date Mining with Ontologies: Implementations, Findings and Frameworks2007
5320. Nijenhuis A. Wilf H.S. Combinatorial algorithms for computers and calculators (2-е издание edition)1978


blank
HR
@Mail.ru
© Электронная библиотека попечительского совета мехмата МГУ, 2004-2025
Электронная библиотека мехмата МГУ | Valid HTML 4.01!| Valid CSS! О проекте