Pesquisas alternativas:
compared laws » compared law (Expandir a Pesquisa), compared less (Expandir a Pesquisa), compiled laws (Expandir a Pesquisa)
computer can » computers can (Expandir a Pesquisa), computer case (Expandir a Pesquisa), computer a (Expandir a Pesquisa)
acl compared » nacl compared (Expandir a Pesquisa), gel compared (Expandir a Pesquisa), ml compared (Expandir a Pesquisa)
a computer » _ computer (Expandir a Pesquisa)
comas luis » tomas luis (Expandir a Pesquisa), cobas luis (Expandir a Pesquisa), covas luis (Expandir a Pesquisa)
age comas » age comes (Expandir a Pesquisa), age combat (Expandir a Pesquisa), age comics (Expandir a Pesquisa)
laws now » laws how (Expandir a Pesquisa), laws new (Expandir a Pesquisa), laws do (Expandir a Pesquisa)
luis now » luis noel (Expandir a Pesquisa), luis n (Expandir a Pesquisa), luis ne (Expandir a Pesquisa)
can non » dan non (Expandir a Pesquisa), than non (Expandir a Pesquisa), can ngoc (Expandir a Pesquisa)
j acl » _ acl (Expandir a Pesquisa), j cl (Expandir a Pesquisa), j adl (Expandir a Pesquisa)
compared laws » compared law (Expandir a Pesquisa), compared less (Expandir a Pesquisa), compiled laws (Expandir a Pesquisa)
computer can » computers can (Expandir a Pesquisa), computer case (Expandir a Pesquisa), computer a (Expandir a Pesquisa)
acl compared » nacl compared (Expandir a Pesquisa), gel compared (Expandir a Pesquisa), ml compared (Expandir a Pesquisa)
a computer » _ computer (Expandir a Pesquisa)
comas luis » tomas luis (Expandir a Pesquisa), cobas luis (Expandir a Pesquisa), covas luis (Expandir a Pesquisa)
age comas » age comes (Expandir a Pesquisa), age combat (Expandir a Pesquisa), age comics (Expandir a Pesquisa)
laws now » laws how (Expandir a Pesquisa), laws new (Expandir a Pesquisa), laws do (Expandir a Pesquisa)
luis now » luis noel (Expandir a Pesquisa), luis n (Expandir a Pesquisa), luis ne (Expandir a Pesquisa)
can non » dan non (Expandir a Pesquisa), than non (Expandir a Pesquisa), can ngoc (Expandir a Pesquisa)
j acl » _ acl (Expandir a Pesquisa), j cl (Expandir a Pesquisa), j adl (Expandir a Pesquisa)
1
Por Andre M. R. Wajong
Publicado em 2012-06-01
Assuntos:
“...computer network, vurnerability, physical security, non physical security...”Publicado em 2012-06-01
Obter o texto integral
Artigo
2
3
Por Minchao Jiang, Renfeng Zhang, Yixiao Xia, Gangyong Jia, Yuyu Yin, Pu Wang, Jian Wu, Ruiquan Ge
Publicado em 2022-04-01
“... called i2APP that can efficiently identify APPs using a two-step machine learning (ML) framework. First...”Publicado em 2022-04-01
Obter o texto integral
Artigo
4
“... an evaluation of Sympmed I was carried out. The patients' symptoms were entered into the computer by a junior...”
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
5
Por Mohammed Sait, Yujian Guo, Omar Alkhazragi, Meiwei Kong, Tien Khee Ng, Boon S. Ooi
Publicado em 2021-01-01
Assuntos:
“...Non-line-of-sight...”Publicado em 2021-01-01
Obter o texto integral
Artigo
6
“...GelBandFitter is a computer program that uses non-linear regression techniques to fit mathematical...”
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
7
8
9
Por Maruschak, Gary F., Mack, Stephen S., Rosenfeld, Gilbert I., Blanck, Thomas J.J.
Publicado em 1983
“..., non-volatile memory, flexible keyboard configuration-every key can be a special function key labeled...”Publicado em 1983
Obter o texto integral
Artigo
10
Por Myers, Catherine E., Kostek, John A., Ekeh, Barbara, Sanchez, Rosanna, Ebanks-Williams, Yasheca, Krusznis, Ann L., Weinflash, Noah, Servatius, Richard J.
Publicado no Comput Human Behav (2016)
“...Behavioral inhibition (BI), a tendency to withdraw from or avoid novel social and non-social...”Publicado no Comput Human Behav (2016)
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
11
Por Furnell, Steven M.
Publicado em 2005
“.... ‘In today’s connected world no-one can afford to ignore computer security, this book tells you why, and what...”Publicado em 2005
Obter o texto integral
Livro
12
Por Ruzat Ullah, Safdar Nawaz Khan Marwat, Arbab Masood Ahmad, Salman Ahmed, Abdul Hafeez, Tariq Kamal, Muhammad Tufail
Publicado em 2020-10-01
“... channel conditions can efficiently utilize resources. To this point, we propose an ML-based technique, i...”Publicado em 2020-10-01
Obter o texto integral
Artigo
13
Por Stringer, G., Couth, S., Brown, L.J.E., Montaldi, D., Gledson, A., Mellor, J., Sutcliffe, A., Sawyer, P., Keane, J., Bull, C., Zeng, X., Rayson, P., Leroi, I.
Publicado no Int J Geriatr Psychiatry (2018)
“...OBJECTIVE: To determine whether multiple computer use behaviours can distinguish between...”Publicado no Int J Geriatr Psychiatry (2018)
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
14
15
16
Por Kehui Zheng, Kehui Zheng, Jiqiang Yan, Jiacong Deng, Weiren Wu, Weiren Wu, Yongxian Wen
Publicado em 2020-11-01
“... the position and effects of a single iQTL; and (iii) CPM-2 can precisely map not only iQTLs, but also non...”Publicado em 2020-11-01
Obter o texto integral
Artigo
17
18
Por Damianus Abun, John Philip G. Javier, Julius Ian B. Gamponia, Theogenia Magallanes, Fredolin P. Julian
Publicado em 2022-04-01
Assuntos:
“...employees , computer internet...”Publicado em 2022-04-01
Obter o texto integral
Artigo
19
Por Cwudziński A.
Publicado em 2015-09-01
“... control device i.e. subflux turbulence controller (STC). In order to obtain a complete hydrodynamic...”Publicado em 2015-09-01
Obter o texto integral
Artigo
20
Por Zule, William A., Bobashev, Georgiy V., Reif, Susan M., Poulton, Winona, Coomes, Curtis M., Wechsberg, Wendee M.
Publicado em 2013
“...There is a need for brief HIV prevention interventions that can be disseminated and implemented...”Publicado em 2013
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo