Search alternatives:
decoding » deciding (Expand Search)
residing » reading (Expand Search), resident (Expand Search), resting (Expand Search)
algorithms » algoritmo (Expand Search)
decoding » deciding (Expand Search)
residing » reading (Expand Search), resident (Expand Search), resting (Expand Search)
algorithms » algoritmo (Expand Search)
-
3241Brazilby Doering, Dionísio“... on several axioms. This representation creates a good base for visualization when there is no information...”
Published 2010
Get full text
article other -
3242
-
3243
-
3244Portugalby Soares, L. P.“...To achieve a full-scale simulation of a pyrite mine, a highly immersive environment becomes...”
Published 2016
Get full text
article -
3245Portugalby Castro, Vitor“... are used to create a deep learning-based model for predicting customer recurrence. Deep neural networks...”
Published 2020
Get full text
conferencePaper -
3246Brazilby Batista,Ben Dêivide de Oliveira“...ABSTRACT The distribution of externally studentized midrange was created based on the original...”
Published 2017
Get full text
article -
3247
-
3248Brazilby Graça,Niarkios Luiz Santos de Salles“... approaches that traditional techniques become unviable or unable to fulfil. This work shows the results...”
Published 2017
Get full text
article -
3249Portugalby Pendão, Cristiano Gonçalves“... to create a radio map, which often requires recalibration. Model-based and geometric approaches try...”
Published 2018
Get full text
conferencePaper -
3250
-
3251Portugalby Martins, Ricardo Manuel Santos“... with wireless communication capability. Altogether, the generated data will feed intelligent algorithms allowing...”
Published 2020
Get full text
conferencePaper -
3252Portugalby Matias, João Carlos de Oliveira“...), which make the consumer's choices in the market difficult. This becomes even more relevant, by knowing...”
Published 2020
Get full text
article -
3253
-
3254
-
3255
-
3256
-
3257Portugalby Pedro Cardoso Lessa e Silva“... browser rendering, it becomes possible to minimize errors in malicious code detection algorithms...”
Published 2016
Get full text
masterThesis -
3258
-
3259
-
3260