Pesquisas alternativas:
davar algorithm » radar algorithm (Expandir procura), 4dvar algorithm (Expandir procura), david algorithms (Expandir procura)
java algorithm » jaya algorithm (Expandir procura), data algorithm (Expandir procura), aca algorithm (Expandir procura)
aaa algorithm » jaya algorithm (Expandir procura), data algorithm (Expandir procura), abc algorithm (Expandir procura)
a algorithm » _ algorithm (Expandir procura), jaya algorithm (Expandir procura)
davar algorithm » radar algorithm (Expandir procura), 4dvar algorithm (Expandir procura), david algorithms (Expandir procura)
java algorithm » jaya algorithm (Expandir procura), data algorithm (Expandir procura), aca algorithm (Expandir procura)
aaa algorithm » jaya algorithm (Expandir procura), data algorithm (Expandir procura), abc algorithm (Expandir procura)
a algorithm » _ algorithm (Expandir procura), jaya algorithm (Expandir procura)
1
por Morioka, Craig, Meng, Frank, Taira, Ricky, Sayre, James, Zimmerman, Peter, Ishimitsu, David, Huang, Jimmy, Shen, Luyao, El-Saden, Suzie
Publicado en J Digit Imaging (2016)
“..., pertinent positive AAA, and visually unacceptable image exams. We developed and evaluated a ConText-based...”Publicado en J Digit Imaging (2016)
Ligazón do recurso
Ligazón do recurso
Ligazón do recurso
Artigo
2
“... -- An implementation of a privacy enforcement scheme based on the java security framework using XACML policies...”
Ligazón do recurso
Ligazón do recurso
Livro