Default Handling in Incremental Generation
Default-all is dangerous!
Defaults and Normality in Causal Structures
Defeasible Logic Programming: An Argumentative Approach
Defeasible Reasoning in OSCAR
Defeating Internet attacks and Spam using "disposable" Mobile IPv6 home addresses
Defeating the Kalka--Teicher--Tsaban linear algebra attack on the Algebraic Eraser
Defect distribution and dissolution morphologies on low-index surfaces of α-quartz
Defect modeling studies in HgCdTe and CdTe
Defect Prevention Approaches In Medium Scale It Enterprises
Defect Prevention Approaches in Medium Scale it Enterprises
Defect-Tolerant CMOL Cell Assignment via Satisfiability
Defects and Transport in Lithium Niobium Trioxide
Defending the future: An MSc module in End User Computing Risk Management
Defense Strategies Against Modern Botnets
Defensive forecasting
Defensive forecasting for linear protocols
Defensive forecasting for optimal prediction with expert advice
Defensive Universal Learning with Experts
Deficiency of molecular hydrogen in the disk of β Pictoris