Works matching DE "COMPUTER periodicals"
1
- Computer und Recht, 2019, v. 35, n. 6, p. r70, doi. 10.9785/cr-2019-350627
- Article
2
- Computer und Recht, 2019, v. 35, n. 6, p. i, doi. 10.9785/cr-2019-frontmatter3506
- Article
3
- Computer und Recht, 2019, v. 35, n. 3, p. r34, doi. 10.9785/cr-2019-350326
- Article
4
- Computer und Recht, 2019, v. 35, n. 2, p. r24, doi. 10.9785/cr-2019-350220
- Article
5
- Computer und Recht, 2018, v. 34, n. 12, p. i, doi. 10.9785/cr-2018-frontmatter3412
- Article
6
- Computer und Recht, 2018, v. 34, n. 12, p. r144, doi. 10.9785/cr-2018-341219
- Article
8
- Computer und Recht, 2018, v. 34, n. 11, p. i, doi. 10.9785/cr-2018-frontmatter3411
- Article
9
- Computer und Recht, 2018, v. 34, n. 11, p. r132, doi. 10.9785/cr-2018-341118
- Article
10
- Computer und Recht, 2018, v. 34, n. 9, p. r107, doi. 10.9785/cr-2018-340920
- Article
11
- Transactions of the Institute of Measurement & Control, 2014, v. 36, n. 7, p. 932, doi. 10.1177/0142331214551669
- Article
12
- Neural Computing & Applications, 2012, v. 21, n. 1, p. 203, doi. 10.1007/s00521-010-0436-y
- Sedehi, M.;
- Mehrabi, Y.;
- Kazemnejad, A.;
- Joharimajd, V.;
- Hadaegh, F.
- Article
13
- ComputerWorld Hong Kong, 2009, v. 26, n. 7, p. 4
- Article
14
- IEEE Transactions on Software Engineering, 2012, v. 38, n. 2, p. c4, doi. 10.1109/TSE.2012.24
- Article
15
- IEEE Transactions on Software Engineering, 2012, v. 38, n. 2, p. c2, doi. 10.1109/TSE.2012.35
- Article
16
- International Journal of Intelligent Systems, 2016, v. 31, n. 5, p. 400, doi. 10.1002/int.21765
- Article
17
- AI Communications, 2011, v. 24, n. 2, p. 105, doi. 10.3233/aic-2011-0497
- Balduccini, Marcello;
- Woltran, Stefan
- Article
18
- Serials Review, 2015, v. 41, n. 2, p. 128, doi. 10.1080/00987913.2015.1030963
- Ashmore, Beth;
- Parang, Elizabeth;
- Tusa, Sarah
- Article
19
- Journal of Magazine & New Media Research, 2018, v. 18, n. 2, p. 1
- Article
20
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 4, p. c3, doi. 10.1109/TDSC.2012.43
- Article
21
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 4, p. c2, doi. 10.1109/TDSC.2012.42
- Article
23
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 1, p. N.PAG, doi. 10.1109/TDSC.2011.5
- Article
24
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 1, p. 160, doi. 10.1109/TDSC.2011.6
- Article
25
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 1, p. c2, doi. 10.1109/TDSC.2011.21
- Article
27
- Computers in the Schools, 2015, v. 32, n. 3/4, p. ebi, doi. 10.1080/07380569.2015.1108717
- Article
28
- International Journal of Computers, Communications & Control, 2012, v. 7, n. 5, p. 796, doi. 10.15837/ijccc.2012.5.1074
- Article
29
- International Journal of Computers, Communications & Control, 2011, v. 6, n. 3, p. 385, doi. 10.15837/ijccc.2011.3.2123
- Article
30
- International Journal of RF & Microwave Computer-Aided Engineering, 2016, v. 26, n. 6, p. N/A, doi. 10.1002/mmce.20955
- Article
31
- International Journal of RF & Microwave Computer-Aided Engineering, 2016, v. 26, n. 6, p. 479, doi. 10.1002/mmce.20932
- Article
32
- Canadian Journal of Communication, 2020, v. 45, n. 1, p. 7, doi. 10.22230/cjc.2020v45n1a3419
- Hayward, Mark;
- Svec, Henry Adam
- Article
33
- IEEE Transactions on Software Engineering, 2010, v. 36, n. 6, p. c1, doi. 10.1109/TSE.2010.100
- Article
34
- IEEE Transactions on Software Engineering, 2010, v. 36, n. 6, p. c2, doi. 10.1109/TSE.2010.101
- Article
35
- INFORMS Journal on Computing, 2013, v. 25, n. 3, p. 395, doi. 10.1287/ijoc.2013.0562
- Article
38
- Interacting with Computers, 2016, v. 28, n. 3, p. 237, doi. 10.1093/iwc/iww009
- Article
39
- Computer Law Review International, 2016, v. 17, n. 4, p. iii, doi. 10.9785/cri-2016-0401
- Article
40
- Computer Law Review International, 2016, v. 17, n. 4, p. i, doi. 10.9785/cri-2016-frontmatter4
- Article
41
- Computer Law Review International, 2016, v. 17, n. 4, p. 129, doi. 10.9785/cri-2016-0408
- Article
42
- Computer Law Review International, 2015, v. 16, n. 6, p. i, doi. 10.9785/cri-2015-0601
- Article
43
- Computer Law Review International, 2015, v. 16, n. 6, p. iii, doi. 10.9785/cri-2015-0602
- Article
44
- Computer Law Review International, 2015, v. 16, n. 5, p. iii, doi. 10.9785/cri-2015-0501
- Article
45
- International Journal of Distributed Sensor Networks, 2014, p. 1, doi. 10.1155/2014/347191
- Article
46
- Journal of Telecommunications & Information Technology, 2015, n. 1, p. 1, doi. 10.26636/jtit.2015.1.768
- Article
50
- International Journal for Computers & Their Applications, 2013, v. 20, n. 1, p. 1
- Article