Перейти к основному содержанию
Мемориальная библиотека А.П. Ершова
Toggle navigation
Издания
Журналы
Новые поступления
Вы здесь
Главная
метод
Связанные издания:
Combinatorial Image Analysis: Proc./19th International Workshop, IWCIA 2018, Porto, Portugal, November 2018
Combining Capability Assessment and Value Engineering: A BOOTSTRAP Example
Combining Interaction and Automation in Process Algebra Verification
Combining Petri Nets and Other Formal Methods
Combining Structural and Enumerative Techniques for the Validation of Bounded Petri Nets
Combining Two Approaches to Object-Oriented Analysis
Comparing Approaches to Data Reification
Comparing Global (Multi-site) SPI Program Activities to SPI Program Models
Comparison Between Artificial Neural Networks and Classical Statistical Methods in Pattern Recognition
Comparison of Methods and Existing Tools for the Measurement of Usability in the Web
Comparison of Parallelization Models for Structured Adaptive Mesh Refinement
Compatible Genericity with Run-time Types for the JavaTM Programming Language
Compilation Techniques for Nondeterminate Flat Concurrent Logic Programming Languages
Compiler Construction: Craftsmaship or Engineering?
Compiler-Directed Page Coloring for Multiprocessors
Compiler Techniques for Concurrent Multithreading with Hardware Speculation Support
Compiler Techniques for Fine-Grain Execution on Workstation Clusters using PAPERS
Compiling Constraint Handling Rules into Prolog with Attributed Variables
Compiling Mercury ti High-Level C Code
Compiling Pattern Matcing by Term Decomposition
Compiling Programs with User Parallelism
Complexity Metrics for Systems Development Methods and Techniques
Complexity of Constraints: An Overview of Current Research Themes
Component Based Design of Multitolerant Systems
Component-Based Programming for Higher-Order Attribute Grammars
Composing Specifications in VSPEC
Compositional Programming Abstractions for Mobile Computing
Composition and Refinement in the B-Method
Compressing Elevation Data
Computational Discovery of Scientific Knowledge: Introduction, Techniques, and Applications in Environmental and Life Sciences
Computational Science and Its Applications - ICCSA 2004, Part IV: Proc./International Conference. Assisi,Italy,May 2004
Computational Science - ICCS 2003: Proc./Intern. Conf., Melbourne, Australia and St.Petersburg, Russia, June 2003. Part II
Computational Science - ICCS 2005. Part I: Proc./5th International Conference. Atlanta, GA, USA, May 2005
Computation Migration: Enhancing Locality for Distributed-Memory Parallel Systems
Computer Aided Verification: Proc./10th Intern. Conf., CAV 98. Vancouver, BC, Canada, June-July 1998
Computer Aided Verification: Proc./5th Intern. Conf., CAV`93. Elounda, Greece, June/July 1993
Computer Aided Verification: Proc./6th Intern. Conf., CAV 94. Stanford, California, USA, June 1994
Computer Aided Verification: Proc./8th International Conference, CAV 96. New Brunswick.NJ.USA,July/August 1996
Computer Aided Verification: Proc./Fourth Intern. Workshop, CAV 92. Montreal, Canada, June-July 1992
Computer Analysis of Images and Patterns, Part I: Proc./17th International Conference, CAIP 2017, Ystad, Sweden, August 2017
Computer Information Systems and Industrial Management: Proc./15th IFIP TC8 International Cobference, CISIM 2016, Vilnius, Lithuania, September 2016
Computer Vision - ECCV 2008: Part II: Proc./10th European Conference on Computer Vision. Marseille, France, October 2008
Computer Vision - ECCV 2008: PartI: Proc./10th European Conference on Computer Vision. Marseille, France, October 2008
Computing and Combinatorics: Proc./23rd International Conference, COCOON 2017, Hong Kong, China, August 2017
Concept Use or Concept Refinement: An Important Distinction in Building Generic Specifications
Concurrency and Data Types: A Specification Method. An Example with LOTOS
Considerations in Developing a Formally-Based Visual Programming Language Reference Manual: A Case Study on the SLAM II Language
Consistency Checking of Evolving Methods
Consistency in Software System Development: Framework, Model, Techniques and Tools
Consistent and Complete Access Control Policies in Use Cases
« первая
‹ предыдущая
…
2
3
4
5
6
7
8
9
10
…
следующая ›
последняя »