1.
|
Using scenarios to derive software Hadad, Graciela Dora Susana
|
2.
|
Software network analyzer for computer network performance measurement planning over heterogeneous services in higher educational institutes Ismail, Mohd Nazri
|
3.
|
Two fuzziness indexes proposed by Kaufmann: observations about them Sierra Duque, Carlos M. - Álvarez, Hernán
|
4.
|
Extracting contour lines from topographic maps based on cartography and graphics knowledge Wu, Rui-Qing - Cheng, Xi-Ran - Yang, Cun-Jian
|
5.
|
The studies on hydrophilic-lipophilic balance (HLB): sixty years after William C. Griffin's pioneer work (1949-2009) Pasquali, Ricardo C. - Sacco, Natalia - Bregni, Carlos
|
6.
|
E711 - A public emergency wireless phone system Matos, Victor - Blake, Ben
|
7.
|
Measuring the component of a divide and conquer skeleton Printista, Alicia Marcela - Saez, Fernando
|
8.
|
Global and local selection in differential evolution for constrained numerical optimization Mezura-Montes, Efrén - Monterrosa-López, Carlos A.
|
9.
|
Hybrid approach for designing smart adaptive Web Sites Kelash, Hamdey M. - Koutb, Magdy M. - Abu Al Kahir, Mona M.
|
10.
|
Robust realtime face recognition and tracking system Chen, Kai - Zhao, Le Jun
|
11.
|
A simulation agent for efficient network evaluation in 3G cellular mobile radio planning Isabona, Joseph - Ekpenyong, Moses E. - Akhirevbulu, Ojeabu
|
12.
|
Platform for collection from heterogeneous web sources and its application to a semantic repository organization at SeDiCI: Preliminaries De Giusti, Marisa Raquel - Sobrado, Ariel - Vosou, Agustín
|
13.
|
An economic view of indirect reputation management for grids Echaiz, Javier - Ardenghi, Jorge Raúl
|
14.
|
Optimized cost effective approach for selection of materialized views in data warehousing Ashadevi, B. - Balasubramanian, R
|
15.
|
Semiclassical grounds of the Calderbank-Shor-Steane quantum error correction codes Avila Aoki, Manuel
|
16.
|
Reduced computational cost in the calculation of worst case response time for real time systems Urriza, José M. - Schorb, Lucas - Orozco, Javier D. - Cayssials, Ricardo
|
17.
|
Power aware routing in ad hoc wireless networks Rishiwal, Vinay - Yadav, Mano - Bajapai, S. K. - Verma, S.
|
18.
|
Sobre la estabilidad del dinero pasivo Olivera, Julio H. G.
|
19.
|
Operating Systems. A concept-based approach, Second Edition D.M. Dhamdhere McGraw Hill, 2006 Romero, Fernando
|
20.
|
A toolbox for the numerical study of linear dynamic rational expectations models Oviedo, Pedro Marcelo
|
21.
|
Un teorema de no equivalencia estática entre las teorías sobre la tasa de interés Roballos, Rodolfo
|
22.
|
Memory disambiguation hardware: a review Castro, Fernando - Chaver, Daniel - Piñuel, Luis - Prieto, Manuel - Tirado, Francisco
|
23.
|
Constraint-Handling in Evolutionary Optimization Efrén Mezura-Montes (Editor) Springer, Studies in Computational Intelligence Series Vol. 198, 1st Edition, 2009 Mezura-Montes, Efrén
|
24.
|
Taller Portal de Revistas UNLP - 2ª edición De Giusti, Marisa Raquel - Lira, Ariel Jorge - Jaquenod De Giusti, Gisele - Villarreal, Gonzalo Luján - Reynoso, Matías
|
25.
|
MINIX4RT: Real-time Semaphores Pessolani, Pablo Andrés
|
26.
|
Nearest neighbor affinity scheduling in heterogeneous multi-core architectures Sibai, Fadi N.
|
27.
|
Comparing marker definition algorithms for watershed segmentation in microscopy images González, Mariela A. - Cuadrado, Teresita R. - Ballarín, Virginia Laura
|
28.
|
Optimizing constrained problems through a T-Cell artificial immune system Aragón, Victoria S. - Esquivel, Susana Cecilia - Coello Coello, Carlos
|
29.
|
La lógica de lo ilógico: toma de decisiones, Clausewitz y la Estrategia de Defensa de los Estados Unidos, The logic of the ilogical: decisions making Clausewitz and the strategy of Defence of the United States Surasky, Javier
|
30.
|
Las revistas académicas del campo de la educación (Argentina, 1990-2002) Devetac, Roald - Palamidessi, Mariano
|
31.
|
Preservación de órganos, inmunología del rechazo y atención farmacéutica Peretta, Marcelo D. - Filinger, Ester Julia
|
32.
|
Hardware radial basis function neural network automatic generation Leiva, Lucas - Acosta, Nelson
|
33.
|
Diseño y evaluación de arquitecturas de computadoras Villagarcía Wanza, Horacio A.
|
34.
|
Test automation for Markov Chain Usage Models Bettinotti, Adriana M. - Garavaglia, Mauricio
|
35.
|
Distributed systems: principles and paradigms (2nd edition) Tinetti, Fernando Gustavo
|
36.
|
Análise da qualidade das propagandas de medicamentos em revistas médicas, Quality of drug advertisements in medical joumals Dal-Pizzol, Felipe - Silva Dal Pizzol, Tatiane da - Schenkel, Eloir Paulo
|
37.
|
Derecho de réplica: Argentina/Santa Sede, Right to rebuttal: Argentina/ Holy Seat- Why remember Alberdi? Custer, Carlos Luis
|
38.
|
La lógica social del boxeo en el Chicago negro. Hacia una sociología del boxeo, The social logic of boxing in black Chicago. Towards a sociology of pugilism Wacquant, Loïc
|
39.
|
La Argentina y el Vaticano, desde la Independencia del País Andino al Pontificado de Juan Pablo II, Argentina and Vatican. From the independence of the Andean country to the rule of John Paul II Armillota, Giovanni
|
40.
|
El mundo de las empleadas administrativas : Perfiles laborales y carreras individuales (Buenos Aires, 1920-1940), The world of women in office jobs : Profile and carcers (Buenos Aires, 1920-1940) Queirolo, Graciela Amalia
|
41.
|
Definition of a goal elicitation process Thomas, Pablo Javier
|
42.
|
An adaptive variable structure controller for the trajectory tracking of a nonholonomic mobile robot with uncertainties and disturbances Almeida Martins, Nardênio - El'youssef, Ebrahim Samer - De Pieri, Edson Roberto - Lombardi, Warody Claudinei - Jungers, Marc
|
43.
|
Position index preserving compression of text data Akhtar, Nasim - Rashid, Mamunur - Islam, Shafiqul - Kashem, Mohammod Abul - Kolybanov, Cyrll Y.
|
44.
|
Group mutual exclusion based on priorities Cenci, Karina M. - Ardenghi, Jorge Raúl
|
45.
|
Reversible data hiding exploiting variance in wavelet coefficients Luo, Xu-Ren - Yin, Te-Lung
|
46.
|
E-mail processing with fuzzy SOMs and
association rules Lanzarini, Laura Cristina - Villa Monte, Augusto - Estrebou, César
|
47.
|
Protocols for microcontrollers networks López, Ricardo A.
|
48.
|
Using thematic contexts and previous solutions for maintaining and accessing institutional repositories Delgado, Pablo H. - Maguitman, Ana Gabriela - Ferracutti, Victor M. - Herrera, Luis A.
|
49.
|
Image steganography: hiding short audio messages withidin digital images Khalil, M.I.
|
50.
|
Forward-link throughput optimization for wireless cellular packet data networks Ekpenyong, Moses E.
|