Buscas alternativas:
algorithms informatica » algorithms informatics (Expandir a busca), algoritmos informatica (Expandir a busca), algorithms information (Expandir a busca)
detector algorithms » detection algorithms (Expandir a busca), detection algorithm (Expandir a busca), selector algorithm (Expandir a busca)
rotational python » rotational motion (Expandir a busca), rotational method (Expandir a busca), rotational path (Expandir a busca)
code detector » core detector (Expandir a busca), code detection (Expandir a busca), diode detector (Expandir a busca)
in rotational » and rotational (Expandir a busca), of rotational (Expandir a busca), in rotation (Expandir a busca)
python python » pythons python (Expandir a busca), piton python (Expandir a busca), pitons python (Expandir a busca)
algorithms informatica » algorithms informatics (Expandir a busca), algoritmos informatica (Expandir a busca), algorithms information (Expandir a busca)
detector algorithms » detection algorithms (Expandir a busca), detection algorithm (Expandir a busca), selector algorithm (Expandir a busca)
rotational python » rotational motion (Expandir a busca), rotational method (Expandir a busca), rotational path (Expandir a busca)
code detector » core detector (Expandir a busca), code detection (Expandir a busca), diode detector (Expandir a busca)
in rotational » and rotational (Expandir a busca), of rotational (Expandir a busca), in rotation (Expandir a busca)
python python » pythons python (Expandir a busca), piton python (Expandir a busca), pitons python (Expandir a busca)
1
2
3
“... proposed in this work is based on the integer linear programming. In the current implementation of topology...”
Acessar documento
Acessar documento
Tese
4
5
6
“... escopo de tais avanços tecnológicos. Trabalhos existentes na literatura sobre detectores de clonagem...”
Acessar documento
Acessar documento
Trabalho de conclusão de curso
7
“... de detectores de rede e detectores dehost. Nesta abordagem, as palavras código que formam uma tabela...”
Acessar documento
Acessar documento
Tese
8
“... de detectores de rede e detectores dehost. Nesta abordagem, as palavras código que formam uma tabela...”
Acessar documento
Acessar documento
Tese