6301. |
Shen W. (Editor) Junzhou Luo (Editor) Zongkai Lin (Editor) |
Computer Supported Cooperative Work in Design III: 10th International Conference, CSCWD 2006, Nanjing, China, May 3-5, 2006, Revised Selected Papers (1 edition) | 2007 |
6302. |
Shepherd R. |
Excel VBA Macro Programming (1 edition) | 2004 |
6303. |
Sheppard L. |
Insights on bias and information in group-level studies | 2003 |
6304. |
Sherin A. |
Introduction to Graphic Design: A Guide to Thinking, Process & Style | 2018 |
6305. |
Sherrod A. |
Game graphics programming | 2008 |
6306. |
Shi Y. van Albada G.D. Dongarra J. |
Computational Science - ICCS 2007: 7th International Conference, Beijing China, May 27-30, 2007, Proceedings, Part IV | 2007 |
6307. |
Shi Y. Xu W. Chen Z. |
Data Mining and Knowledge Management, Chinese Academy of Sciences Symposium, CASDMKM 2004 (1 edition) | 2005 |
6308. |
Shi Z. Shimohara K. Feng D. |
Intelligent Information Processing III | 2006 |
6309. |
Shiavi R. |
Introduction to Applied Statistical Signal Analysis (3-d edition) | 2007 |
6310. |
Shih F.Y. |
Image Processing and Mathematical Morphology. Fundamentals and Applications | 2009 |
6311. |
Shim J.K. Qureshi A.A. Siegel J.G. |
The international handbook of computer security | 2000 |
6312. |
Shin Y.C. Xu C. |
Intelligent systems. Modeling, optimization, and control | 2009 |
6313. |
Shirley P. Ashikhmin M Gleicher M. |
Fundamentals of computer graphics (2 edition) | 2005 |
6314. |
Shirman Y. |
Computer Simulation of Aerial Target Radar Scattering, Recognition, Detection, & Tracking | 2002 |
6315. |
Shiva S.G. |
Computer design and architecture | 2000 |
6316. |
Shiva S.G. |
Computer Organization Design and Architecture (4-th edition) | 2008 |
6317. |
Shoham Y. Leyton-Brown K. |
Multiagent Systems: Algorithmic, Game-Theoretic, and Logical Foundations | 2008 |
6318. |
Shoniregun C.A. Dube K. Mtenzi F. |
Electronic Healthcare Information Security | 2010 |
6319. |
Shoniregun Ch.A. |
Synchronizing Internet Protocol Security (Sipsec) | 2007 |
6320. |
Shostak J. |
SAS Programming in the Pharmaceutical Industry | 2005 |
6321. |
Shoukri M.M. Donner A. |
Efficiency considerations in the analysis of inter-observer agreement | 2001 |
6322. |
Shoup V. |
Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings ... Computer Science / Security and Cryptology) (1 edition) | 2005 |
6323. |
Shoval P. |
Functional and Object Oriented Analysis and Design: An Integrated Methodology | 2006 |
6324. |
Shreiner D. Neider J. Woo M. |
OpenGL Programming Guide (6-th edition) | 2008 |
6325. |
Shtern V. |
Core C++ | 2000 |
6326. |
Shumaker R. (Editor) |
Virtual Reality: Second International Conference, ICVR 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings (1 edition) | 2007 |
6327. |
Shwedyk E. Nguyen N.H. |
A First Course in Digital Communications | 2006 |
6328. |
Shyamasundar R. Ueda K. |
Advances in Computing Science - ASIAN'97: Third Asian Computing Science Conference, Kathmandu, Nepal, December 9-11, 1997. Proceedings | 1997 |
6329. |
Siarry P. (ed.) Michalewicz Z. (ed.) |
Advances in Metaheuristics for Hard Optimization | 2008 |
6330. |
Siau K. |
Advanced Topics in Database Research (vol. 3) | 2004 |
6331. |
Siau K. |
Advanced Topics in Database Research (vol. 4) | 2005 |
6332. |
Siau K. |
Contemporary Issues in Database Design and Information Systems Development | 2007 |
6333. |
Siau K. |
Research Issues in Systems Analysis and Design, Databases and Software Development | 2007 |
6334. |
Siau K. (ed.) |
Advanced Topics in Database Research (vol. 5) | 2006 |
6335. |
Sicart M. |
The ethics of computer games | 2009 |
6336. |
Siekmann J. |
Lecture Notes in Artificial Intelligence (1 edition) | 1987 |
6337. |
Siemers C. |
Rechnernetze und Anwendungen | 1997 |
6338. |
Sierksma G. |
Networks in Action. Text and Computer Exercises in Network Optimization | 2010 |
6339. |
Sierra K. Bates B. |
Java Certified Programmer and Developer for Java 2 | n/a |
6340. |
Sierra K. Bates B. |
SCJP Sun Certified Programmer for Java 6 Study Guide | 2008 |
6341. |
Silas Toms |
ArcPy and ArcGIS – Geospatial Analysis with Python | 2015 |
6342. |
Silberschatz A. |
Database Systems Concepts | 2001 |
6343. |
Silberschatz A. Galvin P.B. |
Operating system concepts (Fifth edition) | 1998 |
6344. |
Silberschatz A. |
Operating System Concepts (Seventh Edition) | 2004 |
6345. |
Silberschatz A. Galvin P.B. Gagne G. |
Operating System Concepts (6th edition) | 2001 |
6346. |
Siler W. Buckley J.J. |
Fuzzy Expert Systems and Fuzzy Reasoning | 2004 |
6347. |
Silmo J. |
Strain- and stress-based continuum damage models | 1987 |
6348. |
Silva L. Bellon O. Boyer K.L. |
Robust Range Image Registration Using Genetic Algorithms And The Surface Interpenetration Measure | 2003 |
6349. |
Silva V. |
Grid computing for developers | 2005 |
6350. |
Silverberg D.M. |
Advanced Web Sites Made Easy: The Simple Way to Build Web Databases and Other Applications Using HTML/OS (1st edition) | 2002 |
6351. |
Sime M.E. Coombs M.J. |
Designing for human-computer communication | 1983 |
6352. |
Simionovich N. |
Asterisk Gateway Interface 1.4 and 1.6 Programming | 2009 |
6353. |
Simmons J. |
Java Programming | 2007 |
6354. |
Simo J. Hughes T. |
Computational Inelasticity | 1998 |
6355. |
Simoff S. Böhlen M.H. Mazeika A. |
Visual Data Mining - Theory | 2008 |
6356. |
Simoff S.J. (ed.) Böhlen M.H. (ed.) Mazeika A. (ed.) |
Visual data mining. Lecture notes in computer science 4404 | 2008 |
6357. |
Simon A. |
Value-Range Analysis of C Programs: Towards Proving the Absence of Buffer Overflow Vulnerabilities | 2008 |
6358. |
Simon I. |
A Comparative Analysis of Methods of Defense against Buffer Overflow Attacks | 2006 |
6359. |
Simon M. |
Spread spectrum communications handbook (1 edition) | 2001 |
6360. |
Simonis V. |
ProgDOC - a program documentation system | 2003 |
6361. |
Simons B. Spector A. |
Fault-Tolerant Distributed Computing 1986 (1 edition) | 1990 |
6362. |
Simos E. Psihoyios G. |
International e-Conference of Computer Science 2006 | 2007 |
6363. |
Simpson A. |
Access VBA Programming For Dummies | 2004 |
6364. |
Simpson W. Greenfield H. |
IPTV and Internet Video: Expanding the Reach of Television Broadcasting | 2007 |
6365. |
Simsion G.C. Witt G.C. |
Data Modeling Essentials (3rd edition) | 2005 |
6366. |
Sinchak S. |
Hacking Windows XP (ExtremeTech) | 2004 |
6367. |
Singer I. |
Duality for Nonconvex Approximation and Optimization | 2006 |
6368. |
Singh A. |
Elements of computation theory | 2009 |
6369. |
Singh A. |
Identifying Malicious Code Through Reverse Engineering (Advances in Information Security) | 2009 |
6370. |
Singh M. |
The Practical Handbook of Internet Computing | 2005 |