Pesquisas alternativas:
computer case » computer based (Expandir a Pesquisa), computer code (Expandir a Pesquisa), computer can (Expandir a Pesquisa)
nacl complex » nac56 complex (Expandir a Pesquisa), caml complex (Expandir a Pesquisa), cl complex (Expandir a Pesquisa)
complex laws » complex leads (Expandir a Pesquisa), complex lasso (Expandir a Pesquisa), complex lacks (Expandir a Pesquisa)
ip computer » _ computer (Expandir a Pesquisa), a computer (Expandir a Pesquisa), 3d computer (Expandir a Pesquisa)
nel company » del company (Expandir a Pesquisa), held company (Expandir a Pesquisa), nail company (Expandir a Pesquisa)
company a » company _ (Expandir a Pesquisa)
case new » cases new (Expandir a Pesquisa), cause new (Expandir a Pesquisa), caste new (Expandir a Pesquisa)
j nacl » _ nacl (Expandir a Pesquisa), 3 nacl (Expandir a Pesquisa), a nacl (Expandir a Pesquisa)
laws e » laws _ (Expandir a Pesquisa), laws a (Expandir a Pesquisa), laws h (Expandir a Pesquisa)
j nel » j neil (Expandir a Pesquisa), j neal (Expandir a Pesquisa), j neel (Expandir a Pesquisa)
a now » a new (Expandir a Pesquisa), a non (Expandir a Pesquisa), _ now (Expandir a Pesquisa)
i ip » i i (Expandir a Pesquisa), i p (Expandir a Pesquisa), i ii (Expandir a Pesquisa)
computer case » computer based (Expandir a Pesquisa), computer code (Expandir a Pesquisa), computer can (Expandir a Pesquisa)
nacl complex » nac56 complex (Expandir a Pesquisa), caml complex (Expandir a Pesquisa), cl complex (Expandir a Pesquisa)
complex laws » complex leads (Expandir a Pesquisa), complex lasso (Expandir a Pesquisa), complex lacks (Expandir a Pesquisa)
ip computer » _ computer (Expandir a Pesquisa), a computer (Expandir a Pesquisa), 3d computer (Expandir a Pesquisa)
nel company » del company (Expandir a Pesquisa), held company (Expandir a Pesquisa), nail company (Expandir a Pesquisa)
company a » company _ (Expandir a Pesquisa)
case new » cases new (Expandir a Pesquisa), cause new (Expandir a Pesquisa), caste new (Expandir a Pesquisa)
j nacl » _ nacl (Expandir a Pesquisa), 3 nacl (Expandir a Pesquisa), a nacl (Expandir a Pesquisa)
laws e » laws _ (Expandir a Pesquisa), laws a (Expandir a Pesquisa), laws h (Expandir a Pesquisa)
j nel » j neil (Expandir a Pesquisa), j neal (Expandir a Pesquisa), j neel (Expandir a Pesquisa)
a now » a new (Expandir a Pesquisa), a non (Expandir a Pesquisa), _ now (Expandir a Pesquisa)
i ip » i i (Expandir a Pesquisa), i p (Expandir a Pesquisa), i ii (Expandir a Pesquisa)
1
Por Carreón, Yojana J. P., Ríos-Ramírez, Maricarmen, Moctezuma, R. E., González-Gutiérrez, Jorge
Publicado no Sci Rep (2018)
“... structurally characterize protein deposits. Secondly, they conform to simple exponential laws that change as a...”Publicado no Sci Rep (2018)
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
2
Por Otzen, Daniel E
Publicado em 2002
“...), while cylindrical micelles prevalent at higher SDS concentrations induce a power-law dependent increase...”Publicado em 2002
Obter o texto integral
Obter o texto integral
Artigo
3
Por Topical Session WG 5.4/TC 5 Computer-Aided Innovation, Cascini, Gaetano., IFIP World Computer Congress
Publicado em 2008
“... ontology: merging legal and technical perspectives -- A systematic innovation case study: new concepts...”Publicado em 2008
Obter o texto integral
Livro
4
Por Industry-Oriented Conferences, Mazzeo, Antonino., Bellini, Roberto., Motta, Gianmario.
Publicado em 2008
“... to move forward and implement e-skills on a long term basis -- IT and professionalism in developing...”Publicado em 2008
Obter o texto integral
Livro
5
6
Por DigiBiz 2009, Rakocevic, Veselin, Stanoevska-Slabeva, Katarina, Telesca, Luigi
Publicado em 2010
Assuntos:
“...Armazenamento e recuperação de informações...”Publicado em 2010
Obter o texto integral
Livro
7
“..., Firewalls, IP Security, Key Cryptography & Message Authentication, and Web Security. New trends...”
Obter o texto integral
Obter o texto integral
Livro
8
“... communications -- Anomaly detection using prior knowledge: application to TCP/IP traffic -- A study...”
Obter o texto integral
Obter o texto integral
Livro
9
Por Kleinjohann, Bernd., Kleinjohann, Lisa., Wolf, Marilyn., IFIP World Computer Congress, TC10 Working Conference on Distributed and Parallel Embedded Systems
Publicado em 2008
“... includes: foundations of computer science; software theory and practice; education; computer applications...”Publicado em 2008
Obter o texto integral
Livro
10
Por Ip, David.
Publicado em 2008
“..., post-operative or non-operative rehabilitation of orthopedic conditions using these new computer...”Publicado em 2008
Obter o texto integral
Livro
11
Por IFIP TC6/TC11 International Conference on Communications and Multimedia Security, Leitold, Herbert., Markatos, Evangelos.
Publicado em 2006
“...Lecture notes in computer science ;...”Publicado em 2006
Obter o texto integral
Livro
12
Por IFIP TC11 International Information Security Conference, Fischer-Hübner, Simone.
Publicado em 2006
“... privacy for buyer-seller e-commerce -- A general certification framework with applications to privacy...”Publicado em 2006
Obter o texto integral
Livro
13
14
Por International ICST Conference IT Revolutions, Ulieru, Mihaela, Palensky, Peter, Doursat, René
Publicado em 2009
Assuntos:
“...Computadores e civilização...”Publicado em 2009
Obter o texto integral
Livro
15
16
17
18
“...Agent-based modeling by a bottom-up approach has shown that it has enough capacity to provide a...”
Obter o texto integral
Obter o texto integral
Online
19
Por Shen, Xuemin
Publicado em 2010
“..., and telephony applications. In addition, a large range of new applications are under development or being...”Publicado em 2010
Obter o texto integral
Livro
20
Por International Conference on Recent Trends in Business Administration and Information Processing, Das, Vinu V.
Publicado em 2010
Assuntos:
“...Computadores e civilização...”Publicado em 2010
Obter o texto integral
Livro