Search alternatives:
"using computational and computer program" » "and computational and computer program" (Expand search), "using computational fluid computer program" (Expand search), "using computational _ computer program" (Expand search)
"applying computational code computer program" » "applying computational model computer program" (Expand search), "applying computational cost computer program" (Expand search), "applying computational models computer program" (Expand search), "applying computational node computer program" (Expand search), "applying computational one computer program" (Expand search)
"using computational and computer program" » "and computational and computer program" (Expand search), "using computational fluid computer program" (Expand search), "using computational _ computer program" (Expand search)
"applying computational code computer program" » "applying computational model computer program" (Expand search), "applying computational cost computer program" (Expand search), "applying computational models computer program" (Expand search), "applying computational node computer program" (Expand search), "applying computational one computer program" (Expand search)
1
2
“... reason behind the genesis of this thesis subject. MitB attacks are performed by a computer program...”
Access document
Access document
Master thesis
3
4
“... resultados obtidos que são bastante conhecidos na literatura e poder reproduzi-los utilizando nosso programa...”
Access document
Access document
Master thesis
5