Pesquisas alternativas:
what computers » how computers (Expandir a Pesquisa), iet computers (Expandir a Pesquisa), what consumers (Expandir a Pesquisa)
nail bombared » nail compared (Expandir a Pesquisa), nails compared (Expandir a Pesquisa)
computers can » computers a (Expandir a Pesquisa), computers _ (Expandir a Pesquisa)
bombared can » compared can (Expandir a Pesquisa), bombarded ccd (Expandir a Pesquisa), bombard a (Expandir a Pesquisa)
can newts » can newly (Expandir a Pesquisa)
nail bomb » oil bomb (Expandir a Pesquisa)
bomb can » bomba con (Expandir a Pesquisa), bomb a (Expandir a Pesquisa), bomb has (Expandir a Pesquisa)
can now » can non (Expandir a Pesquisa), can ngoc (Expandir a Pesquisa)
3 nail » _ nail (Expandir a Pesquisa), 3 nacl (Expandir a Pesquisa)
what computers » how computers (Expandir a Pesquisa), iet computers (Expandir a Pesquisa), what consumers (Expandir a Pesquisa)
nail bombared » nail compared (Expandir a Pesquisa), nails compared (Expandir a Pesquisa)
computers can » computers a (Expandir a Pesquisa), computers _ (Expandir a Pesquisa)
bombared can » compared can (Expandir a Pesquisa), bombarded ccd (Expandir a Pesquisa), bombard a (Expandir a Pesquisa)
can newts » can newly (Expandir a Pesquisa)
nail bomb » oil bomb (Expandir a Pesquisa)
bomb can » bomba con (Expandir a Pesquisa), bomb a (Expandir a Pesquisa), bomb has (Expandir a Pesquisa)
can now » can non (Expandir a Pesquisa), can ngoc (Expandir a Pesquisa)
3 nail » _ nail (Expandir a Pesquisa), 3 nacl (Expandir a Pesquisa)
41
“... intelligence, and evolutionary algorithms are now converging to generate what might broadly be called in silico...”
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
42
Por AbdelHafez, ElShimaa M. N., Diamanduros, Andrew, Negureanu, Lacramioara, Luy, Yan, Bean, J. Hayley, Zielke, Katherine, Crowe, Brittany, Vasilyeva, Aksana, Clodfelter, Jill E., Aly, Omar M., Abuo-Rahma, Gamal El-Din A. A., Scarpinato, Karin D., Salsbury, Freddie R., King, S. Bruce
Publicado no Mol Cancer Biol (2013)
“... combination of computational modeling, chemical synthesis and cell assays, we determine how rescinnamine can...”Publicado no Mol Cancer Biol (2013)
Obter o texto integral
Obter o texto integral
Artigo
43
Por CAKMAK, ALI, QI, XINJIAN, CICEK, A. ERCUMENT, BEDERMAN, ILYA, HENDERSON, LEIGH, DRUMM, MITCHELL, OZSOYOGLU, GULTEKIN
Publicado em 2012
“... in detail, together with its application in a cystic fibrosis study. We also present a computational...”Publicado em 2012
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
44
“... by computational creativity, including: whether a computer can exhibit creativity independently of its creator...”
Obter o texto integral
Obter o texto integral
Livro
45
Por Swat, Maciej, Kiełbasa, Szymon M., Polak, Sebastian, Olivier, Brett, Bruggeman, Frank J., Tulloch, Mark Quinton, Snoep, Jacky L., Verhoeven, Arthur J., Westerhoff, Hans V.
Publicado em 2011
“... how such repositories, and in particular their live versions, can be used for computational SB: we...”Publicado em 2011
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
46
“...A new multiparametric device (RBC-7) was used for recording cough in ambulatory children over a 24...”
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
47
Por Chase, J Geoffrey, Le Compte, Aaron J, Preiser, J-C, Shaw, Geoffrey M, Penning, Sophie, Desaive, Thomas
Publicado em 2011
“..., to create patient-specific models that capture a patient's physiological status. Such models can provide new...”Publicado em 2011
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
48
Por Ziraldo, Cordelia, Gong, Chang, Kirschner, Denise E., Linderman, Jennifer J.
Publicado no Front Microbiol (2016)
“... for each Ag-specific memory population. We created a computational model to explore EM and CM values...”Publicado no Front Microbiol (2016)
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
49
Por Yarkoni, Tal
Publicado em 2012
“...Traditional pre-publication peer review of scientific output is a slow, inefficient, and unreliable...”Publicado em 2012
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
50
What can we learn from learning models about sensitivity to letter-order in visual word recognition?
“... the development of new computational models of reading that regard flexibility in positional coding to be a core...”Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
51
“... for contextual factors. Compensation was modeled by Computing Cues Relative to Expectations (C-CuRE), a new...”
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
52
“...PURPOSE OF REVIEW: Computer simulation models can identify key clinical, operational, and economic...”
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
53
“.... Although individuals can gain critical benefits from their position in a hierarchy, we do not understand...”
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
54
Por Alenka Kavčič, Anja Podlesek, Luka Komidar, Aleš Hladnik, Bojana Boh Podgornik, Ciril Bohak, Katja Depolli Steiner, Alenka Gril, Žiga Lesar, Matija Marolt, Sonja Pečjak, Matevž Pesek, Tina Pirc, Melita Puklek Levpušček, Cirila Peklaj
Publicado em 2022-05-01
“.... The use of appropriate SRL strategies helps students acquire new knowledge more efficiently. We...”Publicado em 2022-05-01
Obter o texto integral
Artigo
55
“... and to what extent have we embraced on new methods? Is the extent of research mirrored in the number...”
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
56
“... to events occurring in a network or on a host computer is considered relevant to the intrusion detection...”
Obter o texto integral
Obter o texto integral
Livro
57
“.... Numerical results reveal that the beam shape coefficients calculated in this way can adequately describe a...”
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
58
“... results and predicting what is inaccessible in experiments. In this paper, we introduce a new sampling...”
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
59
“... by millions of people around the world to post what is happening now. A hashtag, a keyword prefixed with a...”
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
60
“... specific card routine using a series of computer stimuli, researchers have decomposed the effect to assess...”
Obter o texto integral
Obter o texto integral
Livro