609 results on '"Douence A"'
Search Results
2. Evaluating the GeoSnap 13-$\mu$m Cut-Off HgCdTe Detector for mid-IR ground-based astronomy
3. Composing Biases by Using CP to Decompose Minimal Functional Dependencies for Acquiring Complex Formulae.
4. Boolean-Arithmetic Equations: Acquisition and Uses.
5. Boolean-Arithmetic Equations: Acquisition and Uses
6. Boolean-Arithmetic Equations: Acquisition and Uses
7. Acquiring Maps of Interrelated Conjectures on Sharp Bounds.
8. Proving Conjectures Acquired by Composing Multiple Biases.
9. Isotopic composition (δ15N, δ18O) of nitrate in high-frequency precipitation events differentiate atmospheric processes and anthropogenic NOx emissions
10. Distinguishing in-cloud and below-cloud short and distal N-sources from high-temporal resolution seasonal nitrate and ammonium deposition in Vienna, Austria
11. Global Constraint Catalog, Volume II, Time-Series Constraints
12. CoqTL: a Coq DSL for rule-based model transformation.
13. CoqTL: a Coq DSL for rule-based model transformation
14. Invertible Program Restructurings for Continuing Modular Maintenance
15. Views, Program Transformations, and the Evolutivity Problem in a Functional Language
16. The Evolution of the 1982 Regional Reforms: An Overview
17. Assessing the performance of international laboratories analysing the stable isotope composition (δ15N, δ18O, δ17O) of nitrate in environmental waters
18. Evaluating the GeoSnap 13‐μ$$ \mu $$m cutoff HgCdTe detector for mid‐IR ground‐based astronomy
19. Time-Series Constraints: Improvements and Application in CP and MIP Contexts.
20. Time-Series Constraints: Improvements and Application in CP and MIP Contexts
21. L'exercice des compétences locales entre rationalisation et créativité
22. Reactive model transformation with ATL.
23. Acquiring Maps of Interrelated Conjectures on Sharp Bounds
24. A Language for the Composition of Privacy-Enforcement Techniques.
25. Lazy Evaluation for OCL.
26. Using finite transducers for describing and synthesising structural time-series constraints.
27. Lazier Imperative Programming.
28. Reference Monitors for Security and Interoperability in OAuth 2.0
29. Assessing the performance of international laboratories analysing the stable isotope composition (δ15N, δ18O, δ17O) of nitrate in environmental waters.
30. Propos conclusifs : Femmes et droit public : Liberté, égalité, … sororité
31. Boolean-Arithmetic Equations: Acquisition and Uses
32. Reference Monitors for Security and Interoperability in OAuth 2.0.
33. Penser l’agriculture dans le projet de territoire d’une ville moyenne : l’exemple de l’agglomération de Pau
34. Invertible Program Restructurings for Continuing Modular Maintenance.
35. Taming aspects with membranes.
36. A Message-passing Model for Service Oriented Computing.
37. Static analysis of aspect interaction and composition in component models.
38. Composable Controllers in Fractal: Implementation and Interference Analysis.
39. Regard méthodologique sur les paysages viticoles
40. Nitrate isotopes reveal N-cycled waters in a spring-fed agricultural catchment
41. Lazy Composition of Representations in Java.
42. Expressive scoping of distributed aspects.
43. Lazy Composition of Representations in Java
44. Propagation engine prototyping with a domain specific language.
45. Specialized Aspect Languages Preserving Classes of Properties.
46. Aspect-Based Patterns for Grid Programming.
47. Aspects preserving properties.
48. Debugging and Testing Middleware with Aspect-Based Control-Flow and Causal Patterns.
49. Debugging and Testing Middleware with Aspect-Based Control-Flow and Causal Patterns
50. Invasive Patterns for Distributed Programs.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.