Pesquisas alternativas:
computer uses » computer users (Expandir a Pesquisa), computer use (Expandir a Pesquisa), computer user (Expandir a Pesquisa)
claims can » claims a (Expandir a Pesquisa)
i computer » ii computer (Expandir a Pesquisa), pi computer (Expandir a Pesquisa), _ computer (Expandir a Pesquisa)
can newts » can new (Expandir a Pesquisa), can net (Expandir a Pesquisa), can newly (Expandir a Pesquisa)
combs ca » combs c (Expandir a Pesquisa), combs a (Expandir a Pesquisa), combs jan (Expandir a Pesquisa)
ca never » can never (Expandir a Pesquisa), a never (Expandir a Pesquisa), has never (Expandir a Pesquisa)
a claims » _ claims (Expandir a Pesquisa)
uses non » users non (Expandir a Pesquisa), causes non (Expandir a Pesquisa), cases non (Expandir a Pesquisa)
l combs » e combs (Expandir a Pesquisa), _ combs (Expandir a Pesquisa), l comps (Expandir a Pesquisa)
computer uses » computer users (Expandir a Pesquisa), computer use (Expandir a Pesquisa), computer user (Expandir a Pesquisa)
claims can » claims a (Expandir a Pesquisa)
i computer » ii computer (Expandir a Pesquisa), pi computer (Expandir a Pesquisa), _ computer (Expandir a Pesquisa)
can newts » can new (Expandir a Pesquisa), can net (Expandir a Pesquisa), can newly (Expandir a Pesquisa)
combs ca » combs c (Expandir a Pesquisa), combs a (Expandir a Pesquisa), combs jan (Expandir a Pesquisa)
ca never » can never (Expandir a Pesquisa), a never (Expandir a Pesquisa), has never (Expandir a Pesquisa)
a claims » _ claims (Expandir a Pesquisa)
uses non » users non (Expandir a Pesquisa), causes non (Expandir a Pesquisa), cases non (Expandir a Pesquisa)
l combs » e combs (Expandir a Pesquisa), _ combs (Expandir a Pesquisa), l comps (Expandir a Pesquisa)
1
Por Tilson, Julie K., Loeb, Kathryn, Barbosa, Sabrina, Jiang, Fei, Lee, Karin T.
Publicado no J Neurol Phys Ther (2016)
“... therapy students (n = 13 users) tracked their use of tablet computers (iPad), loaded with commercially...”Publicado no J Neurol Phys Ther (2016)
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
2
Por McFarland, Dennis J, Sarnacki, William A, Townsend, George, Vaughan, Theresa, Wolpaw, Jonathan R
Publicado em 2010
“...OBJECTIVE: Brain-computer interface technology can restore communication and control to people who...”Publicado em 2010
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
3
“...A brain–computer interface (BCI) can be defined as any system that can track the person's intent...”
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
4
“... resin covering of the simple tube can be designed with a customized in-and-out compensation, using three...”
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
5
6
Committing to quantum resistance: a slow defence for Bitcoin against a fast quantum computing attack
Por Stewart, I., Ilie, D., Zamyatin, A., Werner, S., Torshizi, M. F., Knottenbelt, W. J.
Publicado no R Soc Open Sci (2018)
Assuntos:
“...Computer Science...”Publicado no R Soc Open Sci (2018)
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
7
“... writing. By selecting key variables, or creating a personal dictionary, LIWC can be used to analyze...”
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
8
Assuntos:
“...Optimization Theory and Computation...”
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
9
Por Foss, Alexander J, Gregson, Richard M, MacKeith, Daisy, Herbison, Nicola, Ash, Isabel M, Cobb, Sue V, Eastgate, Richard M, Hepburn, Trish, Vivian, Anthony, Moore, Diane, Haworth, Stephen M
Publicado em 2013
“... will be randomised to one of three treatments with a ratio of 1:1:1 - I-BiT™ game, non-I-BiT™ game, and I-BiT™ DVD...”Publicado em 2013
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
10
Por Durczak, Karol, Ekielski, Adam, Kozłowski, Radosław, Żelaziński, Tomasz, Pilarski, Krzysztof
Publicado no Heliyon (2020)
“...Operational research, i.e. searching for optimal solutions in a situation of uncertainty and risk...”Publicado no Heliyon (2020)
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
11
“... on speckle tracking method. This technique uses a phenomenon involving the formation of characteristic image...”
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
12
Por Kitano, Mariko, Iwano, Shingo, Hashimoto, Naozumi, Matsuo, Keiji, Hasegawa, Yoshinori, Naganawa, Shinji
Publicado no Int J Chron Obstruct Pulmon Dis (2014)
“...) patients, using paired inspiratory and expiratory three dimensional (3D) computed tomography (CT) images...”Publicado no Int J Chron Obstruct Pulmon Dis (2014)
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
13
“... or non-rejection on clinical grounds. RESULTS: Using the Bayesian belief network, a relatively...”
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
14
“...-based computer running Windows 98 or later, and uses a non-linear regression method to fit steady...”
Obter o texto integral
Obter o texto integral
Artigo
15
Por Fernando L. P. Oliveira, André L. F. Cançado, Gustavo de Souza, Gladston J. P. Moreira, Martin Kulldorff
Publicado em 2018-02-01
“... statistic uses a circular-shaped scanning window. Several other variants, using other parametric or non...”Publicado em 2018-02-01
Obter o texto integral
Artigo
16
Por Abdulghani, Hamza M, Alrowais, Norah A, Alhaqwi, Ali I, Alrasheedi, Ahmed, Al-Zahir, Mohammed, Al-Madani, Ahmed, Al-Eissa, Abdulaziz, Al-Hakmi, Bader, Takroni, Redwan, Ahmad, Farah
Publicado em 2013
“... female students. METHODS: This is a type of cross-sectional study. A sample of 1,070 female students...”Publicado em 2013
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
17
Por Pitt, Esmond.
Publicado em 2006
“... and SSLSockets - Unlocking the mysteries of non-blocking TLS/SSL with the JDK 1.5 SSLEngine - Using...”Publicado em 2006
Obter o texto integral
Livro
18
Por Smith, Jennifer L., Sturrock, Hugh J. W., Olives, Casey, Solomon, Anthony W., Brooker, Simon J.
Publicado em 2013
“... to treatment thresholds. ITM differs from CRS in a number of important ways, including the use of a school...”Publicado em 2013
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
19
Por McCarrier, Kelly P., Atkinson, Thomas M., DeBusk, Kendra P.A., Liepa, Astra M., Scanlon, Michael, Coons, Stephen Joel
Publicado no Clin Ther (2016)
“... age 64.9 [SD=11.2]; 51.0% female) participated in the CE interviews. A total of 1,897 expressions...”Publicado no Clin Ther (2016)
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
20
Por Xu, Yixin, Du, Jianguo, Wang, Yibo, Gong, Bo, Wang, Yue, Qian, Leiming, Tan, Yulin
Publicado no Int J Gen Med (2021)
“... carcinoembryonic antigen (CEA) and carbohydrate antigen (CA) 125 levels were detected. Computer tomography (CT...”Publicado no Int J Gen Med (2021)
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo