Pesquisas alternativas:
computer code » computer model (Expandir a Pesquisa), computer models (Expandir a Pesquisa), computer crime (Expandir a Pesquisa)
al computer » dal computer (Expandir a Pesquisa), apl computer (Expandir a Pesquisa), il computer (Expandir a Pesquisa)
chimp can » chip can (Expandir a Pesquisa), chirp can (Expandir a Pesquisa), camp can (Expandir a Pesquisa)
clamp can » clamp a (Expandir a Pesquisa), clamp ar (Expandir a Pesquisa), clamp cum (Expandir a Pesquisa)
can newts » can newly (Expandir a Pesquisa)
code new » codes new (Expandir a Pesquisa), code net (Expandir a Pesquisa), code nec2 (Expandir a Pesquisa)
l chimp » _ chimp (Expandir a Pesquisa), l chip (Expandir a Pesquisa), _ jchimp (Expandir a Pesquisa)
3 al » a al (Expandir a Pesquisa), 3 yl (Expandir a Pesquisa), 3 a (Expandir a Pesquisa)
computer code » computer model (Expandir a Pesquisa), computer models (Expandir a Pesquisa), computer crime (Expandir a Pesquisa)
al computer » dal computer (Expandir a Pesquisa), apl computer (Expandir a Pesquisa), il computer (Expandir a Pesquisa)
chimp can » chip can (Expandir a Pesquisa), chirp can (Expandir a Pesquisa), camp can (Expandir a Pesquisa)
clamp can » clamp a (Expandir a Pesquisa), clamp ar (Expandir a Pesquisa), clamp cum (Expandir a Pesquisa)
can newts » can newly (Expandir a Pesquisa)
code new » codes new (Expandir a Pesquisa), code net (Expandir a Pesquisa), code nec2 (Expandir a Pesquisa)
l chimp » _ chimp (Expandir a Pesquisa), l chip (Expandir a Pesquisa), _ jchimp (Expandir a Pesquisa)
3 al » a al (Expandir a Pesquisa), 3 yl (Expandir a Pesquisa), 3 a (Expandir a Pesquisa)
1
“... made in restructuring the code following new computer engineering standards, ending with a modular...”
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
2
“...In (Ku et al. 2003), the authors have proposed a construction of edge-disjoint spanning trees EDSTs...”
Obter o texto integral
Obter o texto integral
Artigo
3
Por Schüller, Andreas, Slater, Alex W., Norambuena, Tomás, Cifuentes, Juan J., Almonacid, Leonardo I., Melo, Francisco
Publicado em 2012
“... and three-dimensional (3D) structural similarity of transcriptional regulators with computer prediction...”Publicado em 2012
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
4
Por Otero, José, Palacios, Ana, Suárez, Rosario, Junco, Luis, Couso, Inés, Sánchez, Luciano
Publicado em 2014
“... informative inputs is also uncertain. In this paper, this issue is addressed through a new procedure...”Publicado em 2014
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
5
“...Background and aims The study is aimed at designing and testing a new ergonomic armrest that can...”
Obter o texto integral
Obter o texto integral
Artigo
6
Por Wahlquist, Amy E., Muhammad, Lutfiyya N., Herbert, Teri Lynn, Ramakrishnan, Viswanathan, Nietert, Paul J.
Publicado no PLoS One (2018)
“... into factors associated with citation rates of articles on new biostatistical methods. Making computer code...”Publicado no PLoS One (2018)
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
7
Por Lv, Zhihan, Tek, Alex, Da Silva, Franck, Empereur-mot, Charly, Chavent, Matthieu, Baaden, Marc
Publicado em 2013
“...? This approach points to an extension of open computer programs, not only providing access to the source code...”Publicado em 2013
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
8
9
Por Fadheela Sabri Abu-Almash
Publicado em 2018-05-01
Assuntos:
“...steganography, Huffman coding, embedding secret message, Fibonacci decomposition....”Publicado em 2018-05-01
Obter o texto integral
Artigo
10
Por Workshop on Languages and Compilers for Parallel Computing, Almási, Gheorghe., Cascaval, Calin., Wu, Peng.
Publicado em 2007
“...Lecture notes in computer science...”Publicado em 2007
Obter o texto integral
Livro
11
“... behavior on early microcomputers (Montani et al. in Int J Bio-med Comput 24:41–54, 1989). Ikeda et al. (Ann...”
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
12
Por Katz, Shmuel.
Publicado em 2011
“...Lecture notes in computer science...”Publicado em 2011
Obter o texto integral
Livro
13
“... are strongly encouraged to extend it and develop new methods. We here present three use cases for ODDT...”
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
14
“... the effect of the accuracy of the power curve model on CF estimation. The study considers three CF models...”
Obter o texto integral
Obter o texto integral
Artigo
15
Por Asma A. Al-Hashmi, Fuad A. Ghaleb, A. Al-Marghilani, Abdulsamad E. Yahya, Shouki A. Ebad, Muhammad Saqib M.S., Abdulbasit A. Darem
Publicado em 2022-01-01
“... and code shelling using simple obfuscation techniques. Although a malware variant can change its structure...”Publicado em 2022-01-01
Obter o texto integral
Artigo
16
17
Por Hossam A. Nabwey, Ahmed M. Rashad, Abd El Nasser Mahdy, Shaaban M. Shaaban
Publicado em 2022-05-01
“... mathematical governing equations are solved by implementing a very potent computer algebra software MATLAB code...”Publicado em 2022-05-01
Obter o texto integral
Artigo
18
“... in the techniques from computer and information science to cope with the new challenges arising from the systems...”
Obter o texto integral
Obter o texto integral
Livro
19
Publicado em 2014
“..., 1191–1202 (2012). 3.3 Epigenetic and Metabolic Regulation by a Family of New Lysine Acylation Pathways...”Obter o texto integral
Artigo
20
Por Park, Ben Joonyeon, Jang, Taekjin, Choi, Jong Woo, Kim, Namkug
Publicado no Comput Math Methods Med (2016)
“... from three different programs: CT images from a PACS program, volume-rendered images from a 3D PACS...”Publicado no Comput Math Methods Med (2016)
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo