A mostrar 1 - 20 resultados de 61 para a pesquisa '(((( j da comme a never ) OR ( j a claims can newts ))) OR ( j ip computer can non ))*', tempo de pesquisa: 1.56seg Refinar resultados
3
Por Gunther, Neil J.
Publicado em 2011
... application architecture can be represented as a circuit of queueing delays, PDQ is a natural fit...
Obter o texto integral
Livro
5
... on human and mouse ChIP-seq datasets. GimmeMotifs consists of a suite of command-line scripts that can...
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
11
Por Naudé, J., Paz, J. T., Berry, H., Delord, B.
Publicado em 2012
...Intrinsic plasticity (IP) is a ubiquitous activity-dependent process regulating neuronal...
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
12
Por Pires, J. Norberto.
Publicado em 2007
..., and explores the capabilities of today’s industrial equipment as well as the latest computer and software...
Obter o texto integral
Livro
13
Por Davim, J. Paulo
Publicado em 2008
... is the broad term used to describe the removal of material from a work-piece. Machining processes can...
Obter o texto integral
Livro
14
Por Rudas, Imre J., Fodor, János.
Publicado em 2009
... and computer modeling are the underlying tools that play a major role at any stages of developing intelligent...
Obter o texto integral
Livro
15
Por Budoff, Matthew J., Shinbane, Jerold S.
Publicado em 2006
... and function, but advances in computing power and scanning technology have resulted in its increasing...
Obter o texto integral
Livro
16
Por Brooke, Phillip J., Paige, Richard F.
Publicado em 2008
...Undergraduate topics in computer science...
Obter o texto integral
Livro
17
Por Jansen, Maarten H., Oonincx, Patrick J.
Publicado em 2005
... useful in many applications in engineering and computer science. However they cannot be used with non...
Obter o texto integral
Livro
18
Por Cleophas, Ton J., Zwinderman, Aeilko H.
Publicado em 2012
...Thanks to the omnipresent computer, current statistics can include data files of many thousands...
Obter o texto integral
Livro
19
Por Tsai, Jeffrey J. P., Yu, Philip S.
Publicado em 2009
...Many networked computer systems are far too vulnerable to cyber attacks that can inhibit...
Obter o texto integral
Livro
20
... the concept of intrinsic value, what sorts of things can have intrinsic value, and how to compute intrinsic...
Obter o texto integral
Livro