Search alternatives:
detection algorithm » detection algorithms (Expand search), selection algorithm (Expand search)
algorithm program » algoritmos programa (Expand search), algorithm proposal (Expand search), algorithms programming (Expand search)
coder detection » code detection (Expand search), border detection (Expand search), copper detection (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
manim python » monty python (Expand search), api python (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
detection algorithm » detection algorithms (Expand search), selection algorithm (Expand search)
algorithm program » algoritmos programa (Expand search), algorithm proposal (Expand search), algorithms programming (Expand search)
coder detection » code detection (Expand search), border detection (Expand search), copper detection (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
manim python » monty python (Expand search), api python (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
1
2
3
4
5
“... sintática do código. Para evoluir famílias de programas de forma segura, foram propostas duas estratégias...”
Access document
Access document
Doctoral thesis
6
“... sintática do código. Para evoluir famílias de programas de forma segura, foram propostas duas estratégias...”
Access document
Access document
Doctoral thesis
7
8
9
10
11
12
“... Center (COD) may promptly interfere. The algorithm involves a route logic of distribution networks...”
Access document
Access document
Master thesis
13
“...<div style="text-align: justify;"><span style="font-size: 10pt;">Definir se dois ou mais programas...”
Access document
Access document
Master thesis
14
“... photometric redshifts estimated with ANNz2 algorithm allows us to obtain mildly better results in deeper...”
Access document (1)
Access document (2)
Access document (1)
Access document (2)
Article
15
“... os defeitos presentes nos provetes inspecionados. No final da execução deste programa, são apresentados...”
Access document
Access document
Master thesis
16
17
“... de software usam ofuscação de código para defender seus programas contra ataques de propriedade intelectual...”
Access document
Access document
Doctoral thesis
18
19
20