Sugestões de Tópicos dentro de sua pesquisa.
Sugestões de Tópicos dentro de sua pesquisa.
Pesquisas alternativas:
applications computing » applications computer, applications combining, applications concluding
computing programming » computer programming, computers programming
programming semantics » programming mathematics, programming series, programming secrets
semantics arrays » semantics essays, semantics across, semantics arrow
applications computing » applications computer, applications combining, applications concluding
computing programming » computer programming, computers programming
programming semantics » programming mathematics, programming series, programming secrets
semantics arrays » semantics essays, semantics across, semantics arrow
1
Publicado em 2006
Sumário:
“... of Control -- Programming Language Concepts for Multimedia Application Development -- Implicit and Dynamic...”Obter o texto integral
Recurso Electrónico
livro electrónico
2
Publicado em 2005
Sumário:
“... for Concurrent Java Programs -- Efficient Computation of Communicator Variables for Programs with Unstructured...”Obter o texto integral
Recurso Electrónico
livro electrónico
3
Publicado em 2007
Sumário:
“... with Webcom -- Performance Evaluation of View-Oriented Parallel Programming on Cluster of Computers -- Maximum...”Obter o texto integral
Recurso Electrónico
livro electrónico
4
Publicado em 2005
Sumário:
“... Ad Hoc Network -- A Semantic and Adaptive Context Model for Ubiquitous Computing -- Research...”Obter o texto integral
Recurso Electrónico
livro electrónico
5
Publicado em 2010
Sumário:
“... Augmented Lagrangian Method for Computationally Fast Constrained Optimization -- Evolutionary Programming...”Obter o texto integral
Recurso Electrónico
livro electrónico
6
Publicado em 2005
Sumário:
“... MRI Using a Grid Computing Approach -- A Grid Molecular Simulator for E-Science -- Application Driven...”Obter o texto integral
Recurso Electrónico
livro electrónico
7
Publicado em 2013
Sumário:
“...-specific Characteristics -- The Application of Information Security on the Computer Terminals of 3rd...”Obter o texto integral
Recurso Electrónico
livro electrónico
8
Publicado em 2010
Sumário:
“... Computational Method for Defeasible Argumentation Based on a Recursive Warrant Semantics -- Evolutionary...”Obter o texto integral
Recurso Electrónico
livro electrónico
9
Publicado em 2012
Sumário:
“... Network -- Transient-Time Fractional-Space Trigonometry and Application -- Understanding Individual Play...”Obter o texto integral
Recurso Electrónico
livro electrónico
10
Publicado em 2013
Sumário:
“...-operative Black Hole Attack in MANET -- IP Address Management in Virtualized Cloud Environments -- A Fuzzy C...”Obter o texto integral
Recurso Electrónico
livro electrónico



