Title: Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004, Proceedings / Edition 1, Author: Marc Joye
Title: Reviews in Computational Chemistry, Volume 9 / Edition 1, Author: Kenny B. Lipkowitz
Title: Performance Analysis of Real-Time Embedded Software / Edition 1, Author: Yau-Tsun Steven Li
Title: Aspects of Molecular Computing: Essays Dedicated to Tom Head on the Occasion of His 70th Birthday / Edition 1, Author: Natasha Jonoska
Title: Transactions on Data Hiding and Multimedia Security III / Edition 1, Author: Yun Q. Shi
Title: Parallel Scientific Computing in C++ and MPI: A Seamless Approach to Parallel Algorithms and their Implementation / Edition 1, Author: George Em Karniadakis
Title: Data Analytics and Big Data / Edition 1, Author: Soraya Sedkaoui
Title: Organizations as Learning Systems: 'Living Composition' as an Enabling Infrastructure / Edition 1, Author: Marjatta Maula
Title: Selected Areas in Cryptography - SAC 2015: 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers, Author: Orr Dunkelman
Title: Content and Complexity: information Design in Technical Communication / Edition 1, Author: Michael J. Albers
Title: Human Factors in Intelligent Transportation Systems / Edition 1, Author: Woodrow Barfield
Title: Distributed Database Management Systems: A Practical Approach / Edition 1, Author: Saeed K. Rahimi
Title: Transactions on Petri Nets and Other Models of Concurrency XIII, Author: Maciej Koutny
Title: P, NP, and NP-Completeness: The Basics of Computational Complexity, Author: Oded Goldreich
Title: Quantum Systems, Channels, Information: A Mathematical Introduction / Edition 2, Author: Alexander S. Holevo
Title: Projects in Scientific Computation / Edition 1, Author: Richard E. Crandall
Title: Distributed Computing - IWDC 2003: 5th International Workshop, Kolkata, India, December 27-30, 2003, Proceedings / Edition 1, Author: Samir R. Das
Title: A Practical Guide to Security Engineering and Information Assurance / Edition 1, Author: Debra S. Herrmann
Title: The Work System Method, Author: Steven Alter
Title: Unauthorized Access: The Crisis in Online Privacy and Security / Edition 1, Author: Robert Sloan

Pagination Links