LEADER 00847nam0-22002891i-450- 001 990000567320403321 005 20001010 010 $a0 7923 6325 6 035 $a000056732 035 $aFED01000056732 035 $a(Aleph)000056732FED01 035 $a000056732 100 $a20001010d--------km-y0itay50------ba 101 0 $aita 105 $ay-------001yy 200 1 $a<>Introduction to Fuzzy Logic Applications$eMicroprocessor-based and intelligent systems engineering$fJohnHarris 210 $aUSA$cKluver Academi Publishers$d2000 215 $a218 p.$d23 cm 700 1$aHarris,$bJohn$015898 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990000567320403321 952 $a05 74 380$b$fDININ 959 $aDININ 996 $aIntroduction to Fuzzy Logic Applications$9319717 997 $aUNINA DB $aING01 LEADER 01442nam2-2200409li-450 001 990000207150203316 005 20180312154820.0 010 $a3-540-66695-8 035 $a0020715 035 $aUSA010020715 035 $a(ALEPH)000020715USA01 035 $a0020715 100 $a20001109d1999----km-y0itay0103----ba 101 0 $aeng 102 $aGW 200 1 $aInformation security$esecond International workshop, ISW'99$eKuala Lumpur, Malaysia, November 6-7, 1999$eproceedings$fMasahiro Mambo ... [et al.] (eds.) 210 $aBerlin$cSpringer-Verlag$dcopyr. 1999 215 $aIX, 275 p.$cill.$d24 cm 225 2 $aLecture notes in computer science$v1729 410 0$10010020264$12001$aLecture notes in computer science 610 1 $acongressi$akuala lumpur$a1999 610 1 $asicurezza dei dati$acongressi$a1999 676 $a005478$9Sicurezza dei dati 702 1$aMambo,$bMasahiro 710 12$aInternational workshop ISW'99$d2.$eKuala Lumpur$f1999$0753731 801 $aSistema bibliotecario di Ateneo dell' Università di Salerno$gRICA 912 $a990000207150203316 951 $a001 LNCS (1729)$b0024404$c001$d00104284 959 $aBK 969 $aSCI 979 $c19990119 979 $c20001110$lUSA01$h1714 979 $aALANDI$b90$c20010208$lUSA01$h1525 979 $c20020403$lUSA01$h1628 979 $aPATRY$b90$c20040406$lUSA01$h1615 996 $aInformation security$91516275 997 $aUNISA