Pesquisas alternativas:
java algorithm » jaya algorithm (Expandir a Pesquisa), davar algorithm (Expandir a Pesquisa), aca algorithm (Expandir a Pesquisa)
data algorithm » data algorithms (Expandir a Pesquisa), jaya algorithm (Expandir a Pesquisa)
aaa algorithm » jaya algorithm (Expandir a Pesquisa), abc algorithm (Expandir a Pesquisa), rsa algorithm (Expandir a Pesquisa)
a algorithm » _ algorithm (Expandir a Pesquisa), jaya algorithm (Expandir a Pesquisa)
java algorithm » jaya algorithm (Expandir a Pesquisa), davar algorithm (Expandir a Pesquisa), aca algorithm (Expandir a Pesquisa)
data algorithm » data algorithms (Expandir a Pesquisa), jaya algorithm (Expandir a Pesquisa)
aaa algorithm » jaya algorithm (Expandir a Pesquisa), abc algorithm (Expandir a Pesquisa), rsa algorithm (Expandir a Pesquisa)
a algorithm » _ algorithm (Expandir a Pesquisa), jaya algorithm (Expandir a Pesquisa)
1
Por Morioka, Craig, Meng, Frank, Taira, Ricky, Sayre, James, Zimmerman, Peter, Ishimitsu, David, Huang, Jimmy, Shen, Luyao, El-Saden, Suzie
Publicado no J Digit Imaging (2016)
“..., pertinent positive AAA, and visually unacceptable image exams. We developed and evaluated a ConText-based...”Publicado no J Digit Imaging (2016)
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
2
“... -- An implementation of a privacy enforcement scheme based on the java security framework using XACML policies...”
Obter o texto integral
Obter o texto integral
Livro