Программы

500 кн.
Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers
Trust Extension as a Mechanism for...
Ensemble Methods in Data Mining
Ensemble Methods in Data Mining
Linked Data
Linked Data
Adversarial Machine Learning
Adversarial Machine Learning
Blocks and Chains
Blocks and Chains
The Continuing Arms Race
The Continuing Arms Race
Model-Driven Software Engineering in Practice
Model-Driven Software Engineering i...
Embracing Interference in Wireless Systems
Embracing Interference in Wireless...
Incidental Exposure to Online News
Incidental Exposure to Online News
Mining Heterogeneous Information Networks
Mining Heterogeneous Information Ne...
3D Scientific Visualization with Blender
3D Scientific Visualization with Bl...
Hard Problems in Software Testing
Hard Problems in Software Testing
Demystifying OWL for the Enterprise
Demystifying OWL for the Enterprise
Essentials of Game Theory
Essentials of Game Theory
Verified Functional Programming in Agda
Verified Functional Programming in...
Frontiers of Multimedia Research
Frontiers of Multimedia Research
Assistive Technology Design for Intelligence Augmentation
Assistive Technology Design for Int...
Activity Theory in HCI
Activity Theory in HCI
Deep Learning for Computer Architects
Deep Learning for Computer Architec...
Testing iOS Apps with HadoopUnit
Testing iOS Apps with HadoopUnit
Sentiment Analysis and Opinion Mining
Sentiment Analysis and Opinion Mini...
Candidate Multilinear Maps
Candidate Multilinear Maps
Incentive-Centric Semantic Web Application Engineering
Incentive-Centric Semantic Web Appl...
Shared-Memory Parallelism Can be Simple, Fast, and Scalable
Shared-Memory Parallelism Can be Si...
Для правообладателей и по всем вопросам knigism.info@yandex.ru