Search alternatives:
"using computational and computational program" » "using computational fluid computational program" (Expand search), "using computational _ computational program" (Expand search)
"by computational to computing program" » "by computational to consulting program" (Expand search), "by computational to computer program" (Expand search), "by computational to computador program" (Expand search), "_ computational to computing program" (Expand search), "by computational tool computing program" (Expand search), "by computational _ computing program" (Expand search), "by computational 3d computing program" (Expand search), "by computational fog computing program" (Expand search), "by computational of computing program" (Expand search)
"using computational and computational program" » "using computational fluid computational program" (Expand search), "using computational _ computational program" (Expand search)
"by computational to computing program" » "by computational to consulting program" (Expand search), "by computational to computer program" (Expand search), "by computational to computador program" (Expand search), "_ computational to computing program" (Expand search), "by computational tool computing program" (Expand search), "by computational _ computing program" (Expand search), "by computational 3d computing program" (Expand search), "by computational fog computing program" (Expand search), "by computational of computing program" (Expand search)
1
2
3
“... shape, using the condition factor (K) and ellipticity (E) as criteria. Data from 1380 individuals...”
Access document (1)
Access document (2)
Access document (1)
Access document (2)
Article
4
5
6
7
8
Subjects:
“...Computational thinking education...”
Access document (1)
Access document (2)
Access document (1)
Access document (2)
Master thesis
9
“... verified by comparison with experimental and computational data from the literature. Additionally, the...”
Access document
Access document
Article
10
“... simulation approach to get maximum benefit from SIMD/MIMD computational architectures and highly massive...”
Access document (1)
Access document (2)
Access document (1)
Access document (2)
Conference object
11
“... induced in mice paw using 1.2, 2.5, and 5.0 μg of B. leucurus venom, the percentage of edema was measured...”
Access document (1)
Access document (2)
Access document (1)
Access document (2)
Article
12
“... an N=N bridge, have been synthesized by azo coupling using 1-alkyl(aryl)thienylpyrroles (1) and benzothiazolyl...”
Access document
Access document
Article
13
“...This study has received the major support of the Octacilio Gualberto Foundation (FOG), and it has...”
Access document
Access document
Article
14
“... specification in which parameters are used to abstract variables, such as in predicates and functions. In the...”
Access document
Access document
Doctoral thesis
15
16
17
“... para o usuário por meio de uma interface gráfica (GUI) de fácil utilização. O programa foi construído com ênfase...”
Access document
Access document
Master thesis
18
“... production, using, subverting or listing solutions for artistic creation through computing. We developed...”
Access document
Access document
Master thesis
19
20