Search alternatives:
computational algorithm » computational algorithms (Expand search)
and computational » _ computational (Expand search)
coding program » cloning program (Expand search), loading program (Expand search), cooling programs (Expand search)
encryption in » encryption and (Expand search), encryption of (Expand search), encryption _ (Expand search)
applied from » supplied from (Expand search), applied flow (Expand search), implied from (Expand search)
in coding » on coding (Expand search), in decoding (Expand search), in crowding (Expand search)
advanced » advances (Expand search)
computational algorithm » computational algorithms (Expand search)
and computational » _ computational (Expand search)
coding program » cloning program (Expand search), loading program (Expand search), cooling programs (Expand search)
encryption in » encryption and (Expand search), encryption of (Expand search), encryption _ (Expand search)
applied from » supplied from (Expand search), applied flow (Expand search), implied from (Expand search)
in coding » on coding (Expand search), in decoding (Expand search), in crowding (Expand search)
advanced » advances (Expand search)
1
“...The search for nature-inspired ideas, models and computational paradigms always was of great...”
Access document
Access document
Conference object
2
3
4
5
6
“...A general, versatile and automated computational algorithm to design any type of multiwall...”
Access document (1)
Access document (2)
Access document (1)
Access document (2)
Article
7
8
9
10
11
12
“... advanced persistent threats. These algorithms dynamically generate domain names to maintain and obfuscate...”
Access document (1)
Access document (2)
Access document (1)
Access document (2)
Article
13
14
“...This paper applies an ecology-inspired algorithm (ECO) to solve a complex problem from...”
Access document
Access document
Conference object
15
“...Ferreira, Ana Cristina, e outros (2023) - International conference on technology management and...”
Access document (1)
Access document (2)
Access document (1)
Access document (2)
16
“... on the association of CNN segmentation and polynomial algorithm. The segmentation step resulted...”
Access document (1)
Access document (2)
Access document (1)
Access document (2)
Article
17
18
19
20