Pesquisas alternativas:
nacl compared » acl compared (Expandir a Pesquisa), small compared (Expandir a Pesquisa), gel compared (Expandir a Pesquisa)
ip computers » ip computer (Expandir a Pesquisa), hp computers (Expandir a Pesquisa), iet computers (Expandir a Pesquisa)
compared law » compared a (Expandir a Pesquisa), compared _ (Expandir a Pesquisa), compare a (Expandir a Pesquisa)
naga company » age company (Expandir a Pesquisa), bag company (Expandir a Pesquisa), nosa company (Expandir a Pesquisa)
company law » company a (Expandir a Pesquisa)
law new » jaw new (Expandir a Pesquisa)
law now » laws now (Expandir a Pesquisa), law non (Expandir a Pesquisa), law nor (Expandir a Pesquisa)
_ naga » _ nagoya (Expandir a Pesquisa)
i ip » i i (Expandir a Pesquisa), i p (Expandir a Pesquisa), i ii (Expandir a Pesquisa)
nacl compared » acl compared (Expandir a Pesquisa), small compared (Expandir a Pesquisa), gel compared (Expandir a Pesquisa)
ip computers » ip computer (Expandir a Pesquisa), hp computers (Expandir a Pesquisa), iet computers (Expandir a Pesquisa)
compared law » compared a (Expandir a Pesquisa), compared _ (Expandir a Pesquisa), compare a (Expandir a Pesquisa)
naga company » age company (Expandir a Pesquisa), bag company (Expandir a Pesquisa), nosa company (Expandir a Pesquisa)
company law » company a (Expandir a Pesquisa)
law new » jaw new (Expandir a Pesquisa)
law now » laws now (Expandir a Pesquisa), law non (Expandir a Pesquisa), law nor (Expandir a Pesquisa)
_ naga » _ nagoya (Expandir a Pesquisa)
i ip » i i (Expandir a Pesquisa), i p (Expandir a Pesquisa), i ii (Expandir a Pesquisa)
1
Por Mehdi Imani, Abolfazl Qiyasi, Nasrin Zarif, Maaruf Ali, Omekolsoom Noshiri, Kimia Faramarzi, Hamid R. Arabnia, Majid Joudaki
Publicado em 2020-06-01
“..., the main methods are evaluated in terms of their: (i) computational overhead, (ii) scalability, (iii...”Publicado em 2020-06-01
Obter o texto integral
Artigo
2
Por IFIP TC6/TC11 International Conference on Communications and Multimedia Security, Leitold, Herbert., Markatos, Evangelos.
Publicado em 2006
“...Lecture notes in computer science ;...”Publicado em 2006
Obter o texto integral
Livro
3
Por Ip, David.
Publicado em 2008
“..., post-operative or non-operative rehabilitation of orthopedic conditions using these new computer...”Publicado em 2008
Obter o texto integral
Livro
4
Por Annual Mediterranean Ad Hoc Networking Workshop, Palma, Espanha), Cuenca, Pedro.
Publicado em 2008
“... includes: foundations of computer science; software theory and practice; education; computer applications...”Publicado em 2008
Obter o texto integral
Livro
5
“..., held as a part of the 21th World Computer Congress, WCC 2010, in Brisbane, Australia, in September 2010...”
Obter o texto integral
Obter o texto integral
Livro
6
Por Industry-Oriented Conferences, Mazzeo, Antonino., Bellini, Roberto., Motta, Gianmario.
Publicado em 2008
“... includes: foundations of computer science; software theory and practice; education; computer applications...”Publicado em 2008
Obter o texto integral
Livro
7
Por Ted H. Szymanski
Publicado em 2022-01-01
Assuntos:
“...quantum computing...”Publicado em 2022-01-01
Obter o texto integral
Artigo
8
Por Topical Session WG 5.4/TC 5 Computer-Aided Innovation, Cascini, Gaetano., IFIP World Computer Congress
Publicado em 2008
“... includes: foundations of computer science; software theory and practice; education; computer applications...”Publicado em 2008
Obter o texto integral
Livro
9
“... includes: foundations of computer science; software theory and practice; education; computer applications...”
Obter o texto integral
Obter o texto integral
Livro
10
Por Kleinjohann, Bernd., Kleinjohann, Lisa., Wolf, Marilyn., IFIP World Computer Congress, TC10 Working Conference on Distributed and Parallel Embedded Systems
Publicado em 2008
“... includes: foundations of computer science; software theory and practice; education; computer applications...”Publicado em 2008
Obter o texto integral
Livro
11
“... -- Two new feature selection algorithms with rough sets theory -- Evolutionary computation -- Global...”
Obter o texto integral
Obter o texto integral
Livro
12
Por IFIP TC11 International Information Security Conference, Fischer-Hübner, Simone.
Publicado em 2006
“... internet communities -- Protecting (anonymous) credentials with the Trusted Computing Group’s TPM V1...”Publicado em 2006
Obter o texto integral
Livro
13
14
“... includes: foundations of computer science; software theory and practice; education; computer applications...”
Obter o texto integral
Obter o texto integral
Livro
15
Por Santos, José Augusto Nascimento dos, Almagro, André, Colman, Carina Barbosa, Godoi, Raquel, Siqueira, Paula Prado, Oliveira, Paulo Tarso Sanches de
Publicado em 2020
“... 5 a 90 m de resolução espacial para toda Bacia do Guariroba, resultando em diferentes delineamentos...”Publicado em 2020
Obter o texto integral
Online
16
17
Por Liu, Xiangdong, Jessen, Walter J, Sivaganesan, Siva, Aronow, Bruce J, Medvedovic, Mario
Publicado em 2007
“... of the TMs produced by the new method when compared to either analyzing expression or ChIP-chip data...”Publicado em 2007
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
18
19
“...Inositol 1,4,5-trisphosphate receptor (IP(3)R) is a ubiquitous intracellular calcium (Ca(2...”
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
20
Por Gu, Fei, Hsu, Hang-Kai, Hsu, Pei-Yin, Wu, Jiejun, Ma, Yilin, Parvin, Jeffrey, Huang, Tim H-M, Jin, Victor X
Publicado em 2010
“...: In this study, we applied computational approaches to analyze three public available ChIP-based datasets: ChIP...”Publicado em 2010
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo