• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام
تعداد ۶۱۱ پاسخ غیر تکراری از ۶۱۳ پاسخ تکراری در مدت زمان ۰,۳۰ ثانیه یافت شد.

461. Path problems in networks /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: John S. Baras, George Theodorakopoulos.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Mathematical models.,Graph theory.,Semirings (Mathematics),Computer networks-- Mathematical models.,COMPUTERS-- Data Transmission Systems-- General.,COMPUTERS-- Networking-- Vendor Specific.,Graph theory.,Semirings (Mathematics)

Classification :
TK5105
.
5

462. Pattern recognition and image processing in C++

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Dietrich W.R. Paulus ; Joachim Hornegger.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Bildverarbeitung -- C++,Bildverarbeitung.,Mustererkennung -- C++

Classification :
QA76
.
76
.
C65
D548
1995

463. Perception-action cycle :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Vassilis Cutsuridis, Amir Hussain, John G. Taylor, editors.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Neural networks (Computer science),Perceptual-motor processes.,Mental Processes.,Models, Neurological.,Neural Networks, Computer.,COMPUTERS-- Neural Networks.,Neural networks (Computer science),Perceptual-motor processes.

Classification :
QA76
.
87
.
P47
2010

464. Performance modeling of parallel computations in resource-constrained systems

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: M. Ghodsi

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Applied sciences,Computer science

Classification :

465. Pervasive computing :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: editors, Deepshikha Bhargava, Sonali Vyas.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks.,Mobile computing.,Ubiquitous computing.,Computer networks.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Mobile computing.,Ubiquitous computing.

Classification :
QA76
.
5915

466. Phrase Alignment Models for Statistical Machine Translation

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: DeNero, John Sturdy

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject:

Classification :

467. Playing smart :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Julian Togelius.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Artificial intelligence.,Intellect.,Thought and thinking.,Video games-- Design.,Video games-- Psychological aspects.,Artificial intelligence.,Intellect.,SPORTS & RECREATION-- General.,Thought and thinking.,Video games-- Design.,Video games-- Psychological aspects.

Classification :
GV1469
.
34
.
P79
T64
2018

468. Post-quantum cryptography :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: edited by Tanja Lange, Rainer Steinwandt.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Data encryption (Computer science), Congresses.,Quantum computers, Congresses.,Coding theory & cryptology.,Computer architecture & logic design.,Computers-- Information Theory.,Computers-- Logic Design.,Computers-- Security-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Quantum computers.,Software Engineering.

Classification :
QA76
.
9
.
A25

469. Practical Applications of Computational Biology and Bioinformatics, 13th International Conference /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Florentino Fdez-Riverola, Miguel Rocha, Mohd Saberi Mohamad, Nazar Zaki, José A. Castellanos-Garzón, editors.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Bioinformatics, Congresses.,Computational biology, Congresses.,Bioinformatics.,Computational biology.,SCIENCE-- Life Sciences-- Biology.,SCIENCE-- Life Sciences-- General.

Classification :
QH324
.
2

470. Practical DMX queries for Microsoft SQL Server Analysis Services 2008 /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Art Tennick.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: SQL server.,SQL server.,SQL server.,Data mining.,Querying (Computer science),COMPUTERS / Certification Guides / General.,Data mining.,Querying (Computer science)

Classification :
QA76
.
9
.
D343
T365
2011

471. Practical Java machine learning :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Mark Wickham.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Java (Computer program language),Machine learning.,COMPUTERS-- General.,Java (Computer program language),Machine learning.,Program concepts-- learning to program.,Programming & scripting languages: general.

Classification :
Q325
.
5

472. Practical applications of evolutionary computation to financial engineering :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Hitoshi Iba and Claus C. Aranha.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: BUSINESS & ECONOMICS -- Economics -- General.,Evolutionary computation.,Financial engineering.

Classification :
HG176
.
7
H586
2012

473. Practical cryptography :algorithms and implementations using C++

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: edited by Saiful Azad, Al-Sakib Khan Pathan

Library: Central Library of Hamedan University of Technology (Hamedan)

Subject: ، Data encryption )Computer science(,، Coding theory,Data processing ، Cryptography,، C++ )Computer program language(,، COMPUTERS / Programming Languages / General,، COMPUTERS / Software Development & Engineering / General,، COMPUTERS / Security / Cryptography

Classification :
QA
76
.
9
.
A25
P725

474. Practical embedded security :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: by Timothy Stapko.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security.,Embedded computer systems.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Hardware-- Handheld Devices.,COMPUTERS-- Hardware-- Personal Computers-- General.,COMPUTERS-- Microprocessors.,Embedded computer systems.

Classification :
TK7895
.
E42
S735
2008eb

475. Principles and practice of constraint programming--CP'97 :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Gert Smolka (ed.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Constraint programming (Computer science),Constraint programming (Computer science) -- Congresses.,Programmatuurtechniek.

Classification :

476. Principles of Data Mining /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: by Max Bramer.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Artificial intelligence.,Computer programming.,Computer science.,Database management.,Information storage and retrieval.,Artificial intelligence.,Computer programming.,Computer science.,Database management.

Classification :
QA75
.
5-76
.
95

477. Principles of data mining /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Max Bramer.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Data mining.,Data mining.

Classification :
QA76
.
9
.
D343

478. Principles of quantum artificial intelligence

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Andreas Wichert

Library: Library of College of Science University of Tehran (Tehran)

Subject: Quantum computers,Artificial intelligence

Classification :
EBL
622

479. Principles of security and trust :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Lujo Bauer, Ralf Küsters (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Algorithms & data structures.,Computer science.,Computer security.,Computer security.,Computers-- Computer Science.,Computers-- Hardware-- Handheld Devices.,Computers-- Information Theory.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Data encryption (Computer science),Information technology: general issues.,Systems analysis & design.

Classification :
QA76
.
9
.
A25
P67
2018eb

480. Privacy-preserving data mining :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: edited by Charu C. Aggarwal and Philip S. Yu.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Data mining.,Data protection.,Computer security.,Computer security.,COMPUTERS-- Database Management-- Data Mining.,Data mining.,Data mining.,Data protection.,Data protection.,Informatique.

Classification :
QA76
.
9
.
D343
P75
2008eb
  • »
  • 31
  • 30
  • 29
  • 28
  • 27
  • 26
  • 25
  • 24
  • 23
  • 22
  • 21
  • 20
  • ...
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival