Designing and Managing Industrial Product-Service Systems
Designing Around People
Designing Beauty: The Art of Cellular Automata
Designing Better Services
Designing Cognitive Cities
Designing Digital Musical Instruments Using Probatio
Designing Digital Work
Designing Droplet Microfluidic Networks
Designing Electronic Product Enclosures
Designing Enterprise Information Systems
Designing for a Digital and Globalized World
Designing for Digital Transformation. Co-Creating Services with Citizens and Industry
Designing for Inclusion
Designing for the User Experience in Learning Systems
Designing Immersive Video Games Using 3DUI Technologies
Designing Impedance Networks Converters
Designing Knowledge Management-Enabled Business Strategies
Designing Luxury Brands
Designing Networks for Innovation and Improvisation
Designing Organizations
Designing Performance Measurement Systems
Designing Pilot Projects as Boundary Objects
Designing Public Policies
Designing Sustainable Energy for All
Designing Sustainable Technologies, Products and Policies
Designing the Digital Transformation
Designing the Music Business
Designing Thriving Systems
Designing Urban Food Policies
Designing Usable and Secure Software with IRIS and CAIRIS
Designing Value-Creating Supply Chain Networks
Designing with Computational Intelligence
Designing with Xilinx® FPGAs
Designing, Developing, and Facilitating Smart Cities
Designing, Selecting, Implementing and Using APS Systems
Desingularization: Invariants and Strategy
Desintegrationsdynamiken
Desire and Human Flourishing
Deskriptive Statistik
Deskriptive Statistik
Deskriptive Statistik
Deskriptive Statistik
Dessins d'Enfants on Riemann Surfaces
Destandardisierung, Differenzierung, Individualisierung
Detecting Peripheral-based Attacks on the Host Memory
Detection and Signal Processing
Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems
Detection of Intrusions and Malware, and Vulnerability Assessment
Detection of Intrusions and Malware, and Vulnerability Assessment
Detection of Intrusions and Malware, and Vulnerability Assessment