-
1
مصطلحات موضوعية: Atmospheric Science
وصف الملف: application/pdf
-
2
وصف الملف: application/pdf
-
3
-
4كتاب إلكتروني
-
5كتاب إلكتروني
المؤلفون: Bill Doyle
نوع المادة: eBook.
تصنيفات: JUVENILE FICTION / Action & Adventure / General, JUVENILE FICTION / Recycling & Green Living, JUVENILE FICTION / Science & Nature / Disasters
-
6كتاب إلكتروني
المؤلفون: Bill Doyle
نوع المادة: eBook.
تصنيفات: JUVENILE FICTION / Humorous Stories, JUVENILE FICTION / Action & Adventure / General, JUVENILE FICTION / Family / General
-
7كتاب إلكتروني
المؤلفون: Bill Doyle
نوع المادة: eBook.
الموضوعات: Family life--Fiction, Contests--Fiction, Retail stores--Fiction, Humorous stories, JUVENILE FICTION / Humorous Stories, JUVENILE FICTION / Family / General (see also head, JUVENILE FICTION / Action & Adventure / General
تصنيفات: JUVENILE FICTION / Humorous Stories, JUVENILE FICTION / Action & Adventure / General, JUVENILE FICTION / Family / General
-
8
المؤلفون: Kevin Cotrone, Janella Clary, Oskar Paredes, David P. Miller, Brent Wolf, Aaron Condreay, Matthew Solcher, Jacob Jordan, Bill Doyle, Nathan Justus, Dane Schoelen, Ashley Findley, Alex Borgerding
المصدر: AIAA SPACE 2016.
مصطلحات موضوعية: Computer science, Systems engineering
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::ab8d61ddabff7f08e756435f85d93f16
https://doi.org/10.2514/6.2016-5252 -
9كتاب إلكتروني
المؤلفون: Bill Doyle
نوع المادة: eBook.
تصنيفات: JUVENILE FICTION / Action & Adventure / General, JUVENILE FICTION / Animals / Pigs, JUVENILE FICTION / Monsters
-
10
المؤلفون: Timothy R. Schmoyer, Michael Dufel, Karyn Higa-Smith, Bill Doyle
المصدر: 2015 IEEE International Symposium on Technologies for Homeland Security (HST).
مصطلحات موضوعية: business.industry, Computer science, National Information Exchange Model, Information sharing, Internet privacy, Homeland security, De-identification, ComputingMilieux_LEGALASPECTSOFCOMPUTING, Computer security, computer.software_genre, Critical infrastructure, Documentation, Community of interest (computer security), business, computer, Information exchange
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::40b56a37ebd5cf1935d84da5806fcba7
https://doi.org/10.1109/ths.2015.7225272