nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Are Subsequences of Decimal Digits of PI Random?
|
Suman Kumar Sourabh |
|
2009 |
VII |
2 |
p. 87-96 |
artikel |
2 |
Aspects of SOA: An Entry Point for Starters
|
Qusay F. Hassan |
|
2009 |
VII |
2 |
p. 125-142 |
artikel |
3 |
Computer applications in clinical psychology
|
Alina Oana Zamoşteanu |
|
2009 |
VII |
2 |
p. 159-172 |
artikel |
4 |
Estimators in Cryptography
|
CONSTANTINESCU Nicolae |
|
2009 |
VII |
2 |
p. 23-30 |
artikel |
5 |
From "Nolite turbare circulos meos!" to "Don’t delete my folder"
|
Valerian Antohe |
|
2009 |
VII |
2 |
p. 97-104 |
artikel |
6 |
How many interchanges does the selection sort make for iid geometric(p) input?
|
SAHANI Debasish |
|
2009 |
VII |
2 |
p. 67-76 |
artikel |
7 |
Intelligent Car System
|
Qasim Siddique |
|
2009 |
VII |
2 |
p. 113-124 |
artikel |
8 |
Modeling a geometric locus problem with GeoGebra
|
Gabriela-Simona Antohe |
|
2009 |
VII |
2 |
p. 105-112 |
artikel |
9 |
On an Ethical Use of Neural Networks: A Case Study on a North Indian Raga
|
SHUKLA Ripunjai Kumar |
|
2009 |
VII |
2 |
p. 41-56 |
artikel |
10 |
On the Role of Service Concept in IT
|
DESPI Ioan |
|
2009 |
VII |
2 |
p. 31-40 |
artikel |
11 |
Parameterized Complexity on a New Sorting Algorithm: A Study in Simulation
|
KUMAR Prashant |
|
2009 |
VII |
2 |
p. 9-22 |
artikel |
12 |
Password Authentication Scheme with Secured Login Interface
|
AKINWALE A. Taofiki |
|
2009 |
VII |
2 |
p. 77-85 |
artikel |
13 |
TCP over IEEE 802.11
|
P. Chenna Reddy |
|
2009 |
VII |
2 |
p. 173-183 |
artikel |
14 |
Technique detection software for Sparse Matrices
|
KHAN Muhammad Taimoor |
|
2009 |
VII |
2 |
p. 57-66 |
artikel |