Search alternatives:
usage program » age program (Expand search), image program (Expand search), change program (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
manim python » monty python (Expand search), api python (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
coder data » cover data (Expand search), code data (Expand search), border data (Expand search)
data usage » data use (Expand search)
usage program » age program (Expand search), image program (Expand search), change program (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
manim python » monty python (Expand search), api python (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
coder data » cover data (Expand search), code data (Expand search), border data (Expand search)
data usage » data use (Expand search)
1
2
3
4
5
“..., excessive use of feature annotations may lead to code clutter, hinder program comprehension and harden...”
Access document
Access document
Master thesis
6
Subjects:
“...Róticos; Coda; Variação; Sociolinguística; Teorias Multirrepresentacionais; Rhotics; Variation...”
Access document
Access document
7
8
9
“... according to the Brazilian code NBR 6118:2014. The tool is an add-in for Autodesk Robot Structural Analysis...”
Access document
Access document
Article
10
“..., attackers can now launch attacks remotely. Such attacks arrive as data over a regular communication channel...”
Access document
Access document
Master thesis
11
12
13
Subjects:
“...Visual Basic for Applications (linguagem de programa de computador)...”
Access document
Access document
Bachelor thesis
14
15
16
17
18
“...This article presents a semantics-based program verification framework for critical embedded real...”
Access document (1)
Access document (2)
Access document (1)
Access document (2)
Article
19
“... to separate their domain into different models), probabilistic programming is used to leverage the data...”
Access document
Access document
Master thesis
20
“...-beta decay in 136Xe. To do so, we demonstrate the usage of CNNs for the identification of electron...”
Access document (1)
Access document (2)
Access document (1)
Access document (2)
Article