Search alternatives:
computation using » computations using (Expand search), computation in (Expand search), composition using (Expand search)
computing program » consulting program (Expand search), computer program (Expand search), computador program (Expand search)
functions python » functions methods (Expand search), functions 4th (Expand search), finitos python (Expand search)
using computing » using competing (Expand search), mining computing (Expand search), using conducting (Expand search)
sio2 functions » fusion functions (Expand search), airy functions (Expand search), city functions (Expand search)
using sio2 » using tio2 (Expand search), using six (Expand search)
computation using » computations using (Expand search), computation in (Expand search), composition using (Expand search)
computing program » consulting program (Expand search), computer program (Expand search), computador program (Expand search)
functions python » functions methods (Expand search), functions 4th (Expand search), finitos python (Expand search)
using computing » using competing (Expand search), mining computing (Expand search), using conducting (Expand search)
sio2 functions » fusion functions (Expand search), airy functions (Expand search), city functions (Expand search)
using sio2 » using tio2 (Expand search), using six (Expand search)
1
2
3
4
5
6
7
8
9
10
11
Subjects:
“...General-purpose computing on graphics processing units...”
Access document
Access document
Master thesis
12
13
“... Computation Conference Companion). Association for Computing Machinery, Inc. https://doi.org/10.1145/3319619...”
Access document
Access document
14
“... computation where the data sits, using a potentially slower processor. Hence, runtime environments that deal...”
Access document
Access document
Master thesis
15
“...-of-the-art literature on computer-aided tampered image detection using machine learning techniques...”
Access document (1)
Access document (2)
Access document (1)
Access document (2)
Article
16
17
“... lógicas de ordem superior e não produzem soluções simbólicas ao nível elementar. O programa Math...”
Access document
Access document
18
“...The constant-time programming discipline is an effective countermeasure against timing attacks...”
Access document
Access document
19
20
“... to the full FTIR spectra by computing the distance (dissimilarity) among the olive oils, using the...”
Access document
Access document