• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام
تعداد ۶۰۱ پاسخ غیر تکراری از ۶۱۵ پاسخ تکراری در مدت زمان ۰,۴۲ ثانیه یافت شد.

441. Practical DMX queries for Microsoft SQL Server Analysis Services 2008 /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Art Tennick.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: SQL server.,SQL server.,SQL server.,Data mining.,Querying (Computer science),COMPUTERS / Certification Guides / General.,Data mining.,Querying (Computer science)

Classification :
QA76
.
9
.
D343
T365
2011

442. Practical Java machine learning :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Mark Wickham.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Java (Computer program language),Machine learning.,COMPUTERS-- General.,Java (Computer program language),Machine learning.,Program concepts-- learning to program.,Programming & scripting languages: general.

Classification :
Q325
.
5

443. Practical cryptography :algorithms and implementations using C++

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: edited by Saiful Azad, Al-Sakib Khan Pathan

Library: Central Library of Hamedan University of Technology (Hamedan)

Subject: ، Data encryption )Computer science(,، Coding theory,Data processing ، Cryptography,، C++ )Computer program language(,، COMPUTERS / Programming Languages / General,، COMPUTERS / Software Development & Engineering / General,، COMPUTERS / Security / Cryptography

Classification :
QA
76
.
9
.
A25
P725

444. Practical embedded security :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: by Timothy Stapko.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security.,Embedded computer systems.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Hardware-- Handheld Devices.,COMPUTERS-- Hardware-- Personal Computers-- General.,COMPUTERS-- Microprocessors.,Embedded computer systems.

Classification :
TK7895
.
E42
S735
2008eb

445. Principles of quantum artificial intelligence

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Andreas Wichert

Library: Library of College of Science University of Tehran (Tehran)

Subject: Quantum computers,Artificial intelligence

Classification :
EBL
622

446. Principles of security and trust :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Lujo Bauer, Ralf Küsters (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Algorithms & data structures.,Computer science.,Computer security.,Computer security.,Computers-- Computer Science.,Computers-- Hardware-- Handheld Devices.,Computers-- Information Theory.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Data encryption (Computer science),Information technology: general issues.,Systems analysis & design.

Classification :
QA76
.
9
.
A25
P67
2018eb

447. Privacy-preserving data mining :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: edited by Charu C. Aggarwal and Philip S. Yu.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Data mining.,Data protection.,Computer security.,Computer security.,COMPUTERS-- Database Management-- Data Mining.,Data mining.,Data mining.,Data protection.,Data protection.,Informatique.

Classification :
QA76
.
9
.
D343
P75
2008eb

448. Probabilistic analysis of algorithms : on computing methodologies for computer algorithms performance evaluation

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Hofri, Micha.

Library: Central Library of Sharif University of Technology (Tehran)

Subject: ، Electronic digital computers-- Programming,، Computer algorithms,، Probabilities

Classification :
QA
76
.
6
.
H59
1987

449. Probability with R

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Jane Mary Horgan.,Horgan, Jane M.,

Library: Library of College of Science University of Tehran (Tehran)

Subject: Computer science,Probabilities.,R (Computer program language),Mathematics.

Classification :

450. Proceedings of International Conference on Recent Advancement on Computer and Communication :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Basant Tiwari, Vivek Tiwari, Kinkar Chandra Das, Durgesh Kumar Mishra, Jagdish C. Bansal, editors.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks, Congresses.,Internet of things, Congresses.,Computer networks.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Internet of things.

Classification :
TK5105
.
5

451. Proceedings of 2nd International Conference on Communication, Computing and Networking :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: C. Rama Krishna, Maitreyee Dutta, Rakesh Kumar, editors.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks, Congresses.,Data mining, Congresses.,Artificial Intelligence (incl. Robotics).,Big Data.,Communications Engineering, Networks.,Artificial intelligence.,Communications engineering / telecommunications.,Computer networks.,COMPUTERS / Computer Literacy.,COMPUTERS / Computer Science.,COMPUTERS / Data Processing.,COMPUTERS / Hardware / General.,COMPUTERS / Information Technology.,COMPUTERS / Machine Theory.,COMPUTERS / Reference.,Data mining.,Databases.

Classification :
TK5105
.
5

452. Proceedings of the 2nd International Conference on Data Engineering and Communication Technology :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Anand J. Kulkarni, Suresh Chandra Satapathy, Tai Kang, Ali Husseinzadeh Kashan, editors.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks, Congresses.,Information technology, Congresses.,Artificial Intelligence (incl. Robotics).,Communications Engineering, Networks.,Computational Intelligence.,Systems and Data Security.,Artificial intelligence.,Communications engineering / telecommunications.,Computer networks.,Computer security.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Information technology.

Classification :
T58
.
5

453. Proceedings of the 4th Workshop "Computers in Chemistry :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: J. Gasteiger (ed.). Organized by the Working Group CIC, Computer in der Chemie d. GDCh-Fachgruppe Chemie-Information.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Chemie.,Computer.,Softwareentwicklung.

Classification :
QD39
.
3
.
E46
J437
1990

454. Product-focused software process improvement :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Marco Kuhrmann, Kurt Schneider, Dietmar Pfahl, Sousuke Amasaki, Marcus Ciolkowski, Regina Hebig, Paolo Tell, Jil Klünder, Steffen Küpper (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer software-- Development-- Management, Congresses.,Computer software-- Development, Congresses.,Software engineering, Congresses.,Algorithms & data structures.,Computer networking & communications.,Computer programming-- software development.,Computer software-- Development-- Management.,Computer software-- Development.,Computers-- General.,Computers-- Hardware-- General.,Computers-- Programming-- General.,Computers-- Programming Languages-- General.,Computers-- Software Development & Engineering-- General.,Computers-- Systems Architecture-- General.,Information technology: general issues.,Programming & scripting languages: general.,Software engineering.,Software Engineering.

Classification :
QA76
.
758
.
P76
2018eb

455. Program verification :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject:

Classification :
QA76
.
76
.
V47
P764
2013

456. Programming: The derivation of algorithms

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Kaldewaij, Anne

Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)

Subject: Programming ، Electronic digital computers,، Algorithms

Classification :
QA
76
.
6
.
K3417
1990

457. Programming massively parallel processors :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: David B. Kirk and Wen-mei W. Hwu.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Multiprocessors.,Parallel processing (Electronic computers),Parallel programming (Computer science),Mehrprozessorsystem,Multiprocessors.,Parallel processing (Electronic computers),Parallel programming (Computer science),Parallelverarbeitung,Programmierung

Classification :
QA76
.
642

458. Progress in cryptology -- AFRICACRYPT 2018 :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Antoine Joux, Abderrahmane Nitaj, Tajjeeddine Rachidi (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Algorithms & data structures.,Computer hardware.,Computer security.,Computer security.,Computers-- Hardware-- General.,Computers-- Hardware-- Network Hardware.,Computers-- Information Theory.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Data encryption (Computer science),Information technology: general issues.,Network hardware.

Classification :
QA76
.
9
.
A25

459. Progress in cryptology--AFRICACRYPT 2009 :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Bart Preneel (ed.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security, Congresses.,Computers-- Access control, Congresses.,Cryptography, Congresses.,Data encryption (Computer science), Congresses.,Computer Security.,Computer security.,Computers-- Access control.,Cryptography.,Data encryption (Computer science),Informatique.,Kryptologie

Classification :
QA76
.
9
.
A25
I58
2009

460. Provable security :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Joonsang Baek, Willy Susilo, Jongkil Kim (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computer Systems Organization and Communication Networks.,Computing Milieux.,Cryptology.,Data Structures and Information Theory.,Software Engineering/Programming and Operating Systems.,Algorithms & data structures.,Computer networking & communications.,Computer security.,Computers-- Hardware-- General.,Computers-- Information Theory.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data encryption.,Data protection.,Information technology: general issues.,Software Engineering.

Classification :
QA76
.
9
.
A25
  • »
  • 31
  • 30
  • 29
  • 28
  • 27
  • 26
  • 25
  • 24
  • 23
  • 22
  • 21
  • 20
  • 19
  • ...
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival