22564 publications
- Crowdfunding in Europe
- Crowdfunding in Higher Education Institutions
- Crowdfunding in the Public Sector
- Crowding Out Fiscal Stimulus
- Crowdinvesting
- Crowds in Ireland, c. 1720–1920
- Crowdsourced Data Management
- Crowdsourced Politics
- Crowdsourcing
- Crowdsourcing Geographic Knowledge
- Crowdsourcing of Sensor Cloud Services
- Crowdworking im Entrepreneurship
- Crown Ethers and Phase Transfer Catalysis in Polymer Science
- Crown and Nobility in Early Modern France
- Crown, Church and Estates
- Crucial Event Rehabilitation Therapy
- Crucial Issues in Semiconductor Materials and Processing Technologies
- Cruel Children in Popular Texts and Cultures
- Cruel, Inhuman or Degrading Treatment?
- Cruelty
- Cruelty to Animals
- Cruise Business Development
- Cruise Management
- Cruise Sector Challenges
- Cruise Sector Growth
- Cruise Ship Astronomy and Astrophotography
- Cruise Ship Handbook
- Cruise Tourism and Society
- Crumbs from an old Dutch closet
- Crusade against Drink in Victorian England
- Crusading Against Christians in the Middle Ages
- Crusading in the Fifteenth Century
- Crushing the IT Gender Bias
- Crust/Mantle Recycling at Convergence Zones
- Crustacean Experimental Systems in Neurobiology
- Crustal Evolution of Southern Africa
- Crying Forests
- Cryo-Electron Tomography
- Cryocoolers
- Cryocoolers
- Cryocoolers
- Cryocoolers 10
- Cryocoolers 11
- Cryocoolers 12
- Cryocoolers 13
- Cryocoolers 8
- Cryocoolers 9
- Cryogenic Engineering
- Cryogenic Helium Refrigeration for Middle and Large Powers
- Cryogenic Laboratory Equipment
- Cryogenic Mixed Refrigerant Processes
- Cryogenic Operation of Silicon Power Devices
- Cryogenic Particle Detection
- Cryogenic Process Engineering
- Cryogenic Regenerative Heat Exchangers
- Cryogenic Safety
- Cryopedology
- Cryopreservation and Freeze-Drying Protocols
- Cryopreservation and Freeze-Drying Protocols
- Cryopreservation and Freeze-Drying Protocols
- Cryopreservation and Freeze-Drying Protocols
- Cryopreservation and low temperature biology in blood transfusion
- Cryopreservation in Assisted Reproduction
- Cryopreservation of Fish Gametes
- Cryopreservation of Mammalian Gametes and Embryos
- Cryopreservation of Plant Germplasm I
- Cryopreservation of Plant Germplasm II
- Cryosols
- Cryostat Design
- Cryosurgery
- Cryotechniques in Biological Electron Microscopy
- Cryotherapy in Chest Medicine
- Cryptanalytic Attacks on RSA
- Cryptic Female Choice in Arthropods
- Crypto Basics
- Crypto Uncovered
- Crypto and AI
- CryptoGraphics
- CryptoSchool
- Cryptococcus neoformans
- Cryptocoding Based on Quasigroups
- Cryptocurrency Compliance and Operations
- Cryptofinance and Mechanisms of Exchange
- Cryptographic Algorithms on Reconfigurable Hardware
- Cryptographic Applications of Analytic Number Theory
- Cryptographic Engineering
- Cryptographic Hardware and Embedded Systems
- Cryptographic Hardware and Embedded Systems - CHES 2002
- Cryptographic Hardware and Embedded Systems - CHES 2003
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Cryptographic Hardware and Embedded Systems - CHES 2006
- Cryptographic Hardware and Embedded Systems - CHES 2007
- Cryptographic Hardware and Embedded Systems - CHES 2009
- Cryptographic Hardware and Embedded Systems - CHES 2013
- Cryptographic Hardware and Embedded Systems -- CHES 2015
- Cryptographic Hardware and Embedded Systems – CHES 2005
- Cryptographic Hardware and Embedded Systems – CHES 2008
- Cryptographic Hardware and Embedded Systems – CHES 2011
- Cryptographic Hardware and Embedded Systems – CHES 2012
- Cryptographic Hardware and Embedded Systems – CHES 2014
- Cryptographic Hardware and Embedded Systems – CHES 2016
- Cryptographic Hardware and Embedded Systems – CHES 2017
- Cryptographic Hardware and Embedded Systems — CHES 2000
- Cryptographic Hardware and Embedded Systems — CHES 2001
- Cryptographic Hardware and Embedded Systems, CHES 2010
- Cryptographic Obfuscation
- Cryptographic Protocol
- Cryptographic Security Architecture
- Cryptography
- Cryptography
- Cryptography Arithmetic
- Cryptography Made Simple
- Cryptography and Coding
- Cryptography and Coding
- Cryptography and Coding
- Cryptography and Coding
- Cryptography and Coding
- Cryptography and Coding
- Cryptography and Coding
- Cryptography and Coding
- Cryptography and Coding
- Cryptography and Coding
- Cryptography and Coding
- Cryptography and Coding
- Cryptography and Coding
- Cryptography and Coding
- Cryptography and Computational Number Theory
- Cryptography and Cryptanalysis in Java
- Cryptography and Cryptanalysis in Java
- Cryptography and Cryptanalysis in MATLAB
- Cryptography and Embedded Systems Security
- Cryptography and Information Security in the Balkans
- Cryptography and Information Security in the Balkans
- Cryptography and Lattices
- Cryptography and Security Systems
- Cryptography and Security: From Theory to Applications
- Cryptography for Secure Encryption
- Cryptography in C and C++
- Cryptography in C and C++
- Cryptography in C and C++
- Cryptography in Constant Parallel Time
- Cryptography with Shrinking Generators
- Cryptography, Codes and Cyber Security
- Cryptography: Policy and Algorithms
- Cryptology Transmitted Message Protection
- Cryptology and Error Correction
- Cryptology and Network Security
- Cryptology and Network Security
- Cryptology and Network Security
- Cryptology and Network Security
- Cryptology and Network Security
- Cryptology and Network Security
- Cryptology and Network Security
- Cryptology and Network Security
- Cryptology and Network Security
- Cryptology and Network Security
- Cryptology and Network Security
- Cryptology and Network Security
- Cryptology and Network Security
- Cryptology and Network Security
- Cryptology and Network Security
- Cryptology and Network Security
- Cryptology and Network Security
- Cryptology and Network Security
- Cryptology and Network Security
- Cryptology and Network Security
- Cryptology and Network Security
- Cryptology and Network Security with Machine Learning
- Cryptology and Network Security with Machine Learning
- Cryptorchidism
- Cryptorchidism
- Cryptosporidium
- Cryptosporidium as a Foodborne Pathogen
- Cryptosporidium: parasite and disease
- Crystal Channeling and Its Application at High-Energy Accelerators
- Crystal Chemical Classification of Minerals
- Crystal Chemistry and Properties of Materials with Quasi-One-Dimensional Structures
- Crystal Chemistry of Condensed Phosphates
- Crystal Chemistry of High-Tc Superconducting Copper Oxides
- Crystal Cohesion and Conformational Energies
- Crystal Defects and Crystalline Interfaces
- Crystal Engineering: From Molecules and Crystals to Materials
- Crystal Field Effects in Metals and Alloys
- Crystal Fields for Transition-Metal Ions in Laser Host Materials
- Crystal Growth
- Crystal Growth
- Crystal Growth
- Crystal Growth Bibliography
- Crystal Growth from the Melt
- Crystal Growth in Science and Technology
- Crystal Growth of Si for Solar Cells
- Crystal Identification with the Polarizing Microscope
- Crystal Optics with Spatial Dispersion, and Excitons
- Crystal Oscillator Design and Temperature Compensation
- Crystal Pulling from the Melt
- Crystal Structure Determination
- Crystal Structure Determination
- Crystal Structure Determination
- Crystal Structure,Electronic and Optical Properties of Epitaxial Alkaline Earth Niobate Thin Films
- Crystal Structures of Inorganic Compounds