1

Reforming rape laws

Année:
1992
Langue:
english
Fichier:
PDF, 1.42 MB
english, 1992
3

Reforming Rape Laws: Effects of Legislative Change in Canada

Année:
1992
Langue:
english
Fichier:
PDF, 486 KB
english, 1992
6

Non-Nested Linear Models: A Conditional Confidence Approach

Année:
1987
Langue:
english
Fichier:
PDF, 704 KB
english, 1987
9

Interest and Pleasure as Dimensions of Aesthetic Response

Année:
1990
Langue:
english
Fichier:
PDF, 644 KB
english, 1990
10

Attribution of Responsibility and Crime Seriousness

Année:
1987
Langue:
english
Fichier:
PDF, 479 KB
english, 1987
12

Perception and Production in Children's Art

Année:
1989
Langue:
english
Fichier:
PDF, 1.35 MB
english, 1989
13

A Methodology for Secure Recovery of Spacecrafts based on a Trusted Hardware Platform

Année:
2016
Langue:
english
Fichier:
PDF, 2.23 MB
english, 2016
18

The purposes of sentencing: Public support for competing aims

Année:
1989
Langue:
english
Fichier:
PDF, 1.01 MB
english, 1989
19

An optimal methodology for synthesis of DSP multichip architectures

Année:
1995
Langue:
english
Fichier:
PDF, 940 KB
english, 1995
20

Rape reform in Canada: Public knowledge and opinion

Année:
1996
Langue:
english
Fichier:
PDF, 900 KB
english, 1996
21

EM alignment using phase for secure embedded systems

Année:
2008
Langue:
english
Fichier:
PDF, 1.27 MB
english, 2008
22

Statistically based prediction of power dissipation for complex embedded DSP processors

Année:
1999
Langue:
english
Fichier:
PDF, 632 KB
english, 1999
23

Understanding and predicting attitudes towards computers

Année:
1992
Langue:
english
Fichier:
PDF, 1.06 MB
english, 1992
26

Optimal synthesis of high-performance architectures

Année:
1992
Langue:
english
Fichier:
PDF, 923 KB
english, 1992
27

Synthesizing embedded speed-optimized architectures

Année:
1993
Langue:
english
Fichier:
PDF, 1.14 MB
english, 1993
28

Integration of algorithmic VLSI synthesis with testability incorporation

Année:
1989
Langue:
english
Fichier:
PDF, 838 KB
english, 1989
32

Security in Embedded Devices || Using Keys

Année:
2010
Langue:
english
Fichier:
PDF, 347 KB
english, 2010
33

Security in Embedded Devices || Reliable Testable Secure Systems

Année:
2010
Langue:
english
Fichier:
PDF, 551 KB
english, 2010
34

Security in Embedded Devices || Where Security Began

Année:
2010
Langue:
english
Fichier:
PDF, 243 KB
english, 2010
35

Security in Embedded Devices || Elliptic Curve Protocols

Année:
2010
Langue:
english
Fichier:
PDF, 491 KB
english, 2010
36

Security in Embedded Devices || Data Integrity and Message Authentication

Année:
2010
Langue:
english
Fichier:
PDF, 474 KB
english, 2010
37

Security in Embedded Devices || Symmetric Key Protocols Including Ciphers

Année:
2010
Langue:
english
Fichier:
PDF, 795 KB
english, 2010
38

Security in Embedded Devices || Side Channel Attacks on the Embedded System

Année:
2010
Langue:
english
Fichier:
PDF, 2.11 MB
english, 2010
39

Security in Embedded Devices || || Front_matter

Année:
2010
Langue:
english
Fichier:
PDF, 121 KB
english, 2010
40

Security in Embedded Devices || Countermeasures

Année:
2010
Langue:
english
Fichier:
PDF, 1.29 MB
english, 2010
41

Security in Embedded Devices || The Key

Année:
2010
Langue:
english
Fichier:
PDF, 361 KB
english, 2010
42

Security in Embedded Devices || Introduction to Secure Embedded Systems

Année:
2010
Langue:
english
Fichier:
PDF, 256 KB
english, 2010
43

Security in Embedded Devices || Summary, Standards, and Ongoing Efforts

Année:
2010
Langue:
english
Fichier:
PDF, 113 KB
english, 2010
45

Security in Embedded Devices ||

Année:
2010
Langue:
english
Fichier:
PDF, 121 KB
english, 2010
46

The Insurance Branch Manager: Correlates of Success

Année:
1987
Langue:
english
Fichier:
PDF, 549 KB
english, 1987