Suggested Topics within your search.
Suggested Topics within your search.
- Research 4
- Algebra, Boolean 2
- Computer algorithms 2
- Computer security 2
- Cryptography 2
- Data mining 2
- Data processing 2
- Databases 2
- Energy development 2
- Geometry 2
- Geometry, Algebraic 2
- Government policy 2
- Hazard mitigation 2
- Political violence 2
- Prevention 2
- Science 2
- Statistical methods 2
- Study and teaching 2
- Terrorism 2
- Terrorism risk assessment 2
- War 2
- Water resources development 2
-
1
Science education best practices of research training for students under 21 /
Published 2005An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
2
Computational commutative and non-commutative algebraic geometry
Published 2005An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
3
Sharing knowledge across the Mediterranean area towards a partnership for sustainable management of resources and the prevention of catastrophes /
Published 2006An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
4
Boolean functions in cryptology and information security
Published 2008An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
5
Building and using datasets on armed conflicts
Published 2008An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
6
Mining massive data sets for security advances in data mining, search, social networks and text mining, and their applications to security /
Published 2008An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
7
Science education best practices of research training for students under 21 /
Published 2005An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
8
Computational commutative and non-commutative algebraic geometry
Published 2005An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
9
Sharing knowledge across the Mediterranean area towards a partnership for sustainable management of resources and the prevention of catastrophes /
Published 2006An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
10
Boolean functions in cryptology and information security
Published 2008An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
11
Building and using datasets on armed conflicts
Published 2008An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
12
Mining massive data sets for security advances in data mining, search, social networks and text mining, and their applications to security /
Published 2008An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook