Search
Selected: U

Using Gif (Graphics Interchange Format) Images In Physics Education

Computer Science – Learning
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using GIS (Geographic Information System) Technology to Assess the Resource Potential of Lunar Pyroclastic Deposits

Computer Science
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using global magnetospheric models for simulation and interpretation of Swarm external field measurements

Computer Science
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using graphics processing units to generate random numbers

Computer Science – Distributed – Parallel – and Cluster Computing
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using Graphics Processors for Parallelizing Hash-based Data Carving

Computer Science – Distributed – Parallel – and Cluster Computing
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using GRB 080723B to cross-calibrate Fermi/GBM and INTEGRAL

Computer Science
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using Grid Files for a Relational Database Management System

Computer Science – Databases
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using Grossone to count the number of elements of infinite sets and the connection with bijections

Computer Science – Discrete Mathematics
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using groups for investigating rewrite systems

Computer Science – Logic in Computer Science
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using Hashing to Solve the Dictionary Problem (In External Memory)

Computer Science – Data Structures and Algorithms
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using Hausdorff Distance for New Medical Image Annotation

Computer Science – Information Retrieval
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using Hierarchical Data Mining to Characterize Performance of Wireless System Configurations

Computer Science – Computational Engineering – Finance – and Science
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using high-resolution near infrared spectroscopy to probe the interstellar medium and circumstellar disks

Computer Science
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using Higher-Order Logic Programming for Semantic Interpretation of Coordinate Constructs

Computer Science – Computation and Language
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using Hopfield to Solve Resource-Leveling Problem

Computer Science – Neural and Evolutionary Computing
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using HST/WFC3 to Constrain the Lyman Cutoff and Colors of the Cosmic Infrared Background Fluctuations Detected by Spitzer/IRAC

Computer Science
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using Image Attributes for Human Identification Protocols

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using image partitions in 4th Dimension

Computer Science – Databases
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using Images to create a Hierarchical Grid Spatial Index

Computer Science – Data Structures and Algorithms
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.