unauthorized copying
Identification of a 40KD Protein Increased by HSV-2 Infection
372
The absorption of amino acids from the mammalian intestine
282
A computational framework for using both rules and previously-decided cases in a legal decision making process
255
The pathogenesis and non-surgical treatment of gallstones : Clinical and laboratory studies
295
Personal continuums: The autobiographical fiction and fictional autobiographies of Abraham Cahan, Anzia Yezierska and Henry Roth
305
Ultrasound in the diagnosis of carpal tunnel syndrome.
211
Psychophysiological aspects of anxiety and depression
309
A Collection Model for Data Management in Object-Oriented Systems
181
Organometallic Complexes as Ligands
211
Ionisation in mercury vapour and helium
182
The Urease Activity of Helicobacter pylori and Duodenal Ulcer Disease
258
The Carboniferous Rocks Between the Ox Mountains and Donegal Bay
129
An Electron-Optical Study of Iron Oxide Phases Produced in Alkaline and Acidic Ferric Solution in the Presence of Selected Additive Species
259
The ECJ Rules on Private Copying Levy
7
Code-Copying in the Balochi Language of Sistan
27
Professor
15
Study of Security Risk and Vulnerabilities of Cloud Computing
7
Security Enhancement on Firmware for the Internet of Things
6
The Application of the Econometric Models with Qualitative Variables in the Analysis of the Non Academic Behaviors at the Level of the Romanian Higher Education System
9
Encryption & Decryption of Data Using Huffman Compression and Exclusive Dis-junction
9