Search ResultsElektronik Kaynaklar 
by
Kumar, Mohit, author.
Format:
Alıntı:
languages used in ICT systems. We evaluate energy consumption of data types, operators, control statements
by
Mellott, Matthew J., author.
Format:
Alıntı:
Medium access control (MAC) is a fundamental problem in wireless networks. In ad-hoc wireless
by
Chakma, Avijoy, author.
Format:
Alıntı:
system. An efficient PM2.5 monitoring is of great benefit for human health and air pollution control. In
by
Ogemuno, Emamuzo Cletus, author.
Format:
Alıntı:
network access control. Also known as typing dynamics, keystroke refers to a method that identifies users
by
Gao, Ning, author.
Format:
Alıntı:
-core environments and it adopts a hybrid of optimistic concurrency control and two-phase commit protocols to narrow
by
Liu, Feng, author.
Format:
Alıntı:
sequentially to respect data and control dependences. Second, static methods cannot fully exploit speculation
by
Azahndeh, Koorosh, author.
Format:
Alıntı:
techniques, especially when it deals with the control overhead costs and network latency. Additionally, multi
by
Liles, Karina, author.
Format:
Alıntı:
with two conditions: A) with a non-adaptive robot (control group); and B) with a socially adaptive
by
Reddeddy, Sanath Kumar Reddy, author.
Format:
Alıntı:
Our approach to this thesis, to design role management model to control user authority and to
by
Qureshi, Mohammed Azmat, author.
Format:
Alıntı:
which can be retrieved from institutions like the Centre for Disease Control (CDC), World Health
by
Mani Gupta, Arjun, author.
Format:
Alıntı:
into the frame, and so it can be controlled by either the user or an attendant. This control is most
by
Anderson, David, author.
Format:
Alıntı:
, information about which clauses most often differ based on control flow was extracted as well as counts for

Eylem Seç





