Littérature scientifique sur le sujet « HASH METHODS »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Sommaire
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « HASH METHODS ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "HASH METHODS"
Safaryan, Olga, Larissa Cherckesova, Nikita Lyashenko, Pavel Razumov, Vladislav Chumakov, Boris Akishin et Andrey Lobodenko. « Modern Hash Collision CyberAttacks and Methods of Their Detection and Neutralization ». Journal of Physics : Conference Series 2131, no 2 (1 décembre 2021) : 022099. http://dx.doi.org/10.1088/1742-6596/2131/2/022099.
Texte intégralBlackburn, Simon R. « Perfect Hash Families : Probabilistic Methods and Explicit Constructions ». Journal of Combinatorial Theory, Series A 92, no 1 (octobre 2000) : 54–60. http://dx.doi.org/10.1006/jcta.1999.3050.
Texte intégralJinnai, Yuu, et Alex Fukunaga. « On Hash-Based Work Distribution Methods for Parallel Best-First Search ». Journal of Artificial Intelligence Research 60 (30 octobre 2017) : 491–548. http://dx.doi.org/10.1613/jair.5225.
Texte intégralLiu, Xingbo, Xiushan Nie, Yingxin Wang et Yilong Yin. « Jointly Multiple Hash Learning ». Proceedings of the AAAI Conference on Artificial Intelligence 33 (17 juillet 2019) : 9981–82. http://dx.doi.org/10.1609/aaai.v33i01.33019981.
Texte intégralFitas, Ricardo, Bernardo Rocha, Valter Costa et Armando Sousa. « Design and Comparison of Image Hashing Methods : A Case Study on Cork Stopper Unique Identification ». Journal of Imaging 7, no 3 (8 mars 2021) : 48. http://dx.doi.org/10.3390/jimaging7030048.
Texte intégralMa, Xian-Qin, Chong-Chong Yu, Xiu-Xin Chen et Lan Zhou. « Large-Scale Person Re-Identification Based on Deep Hash Learning ». Entropy 21, no 5 (30 avril 2019) : 449. http://dx.doi.org/10.3390/e21050449.
Texte intégralUssatova, О., Ye Begimbayeva, S. Nyssanbayeva et N. Ussatov. « ANALYSIS OF METHODS AND PRACTICAL APPLICATION OF HASH FUNCTIONS ». SERIES PHYSICO-MATHEMATICAL 5, no 339 (15 octobre 2021) : 100–110. http://dx.doi.org/10.32014/2021.2518-1726.90.
Texte intégralYARMILKO, Аndii, Inna ROZLOMII et Yuliya MYSIURA. « USAGE OF HASH METHODS IN THE CRYPTOGRAPHIC DATA ANALYSIS ». Herald of Khmelnytskyi National University 303, no 6 (décembre 2021) : 49–54. http://dx.doi.org/10.31891/2307-5732-2021-303-6-49-54.
Texte intégralLong, Jun, Longzhi Sun, Liujie Hua et Zhan Yang. « Discrete Semantics-Guided Asymmetric Hashing for Large-Scale Multimedia Retrieval ». Applied Sciences 11, no 18 (21 septembre 2021) : 8769. http://dx.doi.org/10.3390/app11188769.
Texte intégralGabryel, Marcin, Konrad Grzanek et Yoichi Hayashi. « Browser Fingerprint Coding Methods Increasing the Effectiveness of User Identification in the Web Traffic ». Journal of Artificial Intelligence and Soft Computing Research 10, no 4 (1 octobre 2020) : 243–53. http://dx.doi.org/10.2478/jaiscr-2020-0016.
Texte intégralThèses sur le sujet "HASH METHODS"
Kim, Kyung-Mi. « Perfect Hash Families : Constructions and Applications ». Thesis, University of Waterloo, 2003. http://hdl.handle.net/10012/1118.
Texte intégralKaščák, Andrej. « Komprese záznamů o IP tocích ». Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-235520.
Texte intégralResch, Bernd, et Peter Romirer-Maierhofer. « Global Positioning in Harsh Environments ». Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-282.
Texte intégralAs global location systems offer only restricted availability, they are not suitable for a world-
wide tracking application without extensions. This thesis contains a goods-tracking solution,
which can be considered globally working in contrast to formerly developed technologies. For
the creation of an innovative approach, an evaluation of the previous efforts has to be made.
As a result of this assessment, a newly developed solution is presented in this thesis that uses
the Global Positioning System (GPS) in connection with the database correlation method
involving Global System for Mobile Communications (GSM) fingerprints. The database
entries are generated automatically by measuring numerous GSM parameters such as Cell
Identity and signal strength involving handsets of several different providers and the real
reference position obtained via a high sensitivity GPS receiver.
Lisø, Kim Robert. « Building Envelope Performance Assessments in Harsh Climates : Methods for Geographically Dependent Design ». Doctoral thesis, Norwegian University of Science and Technology, Department of Civil and Transport Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-1123.
Texte intégralThe lifetime of the built environment depends strongly on the severity of local climatic conditions. A well-functioning and reliable infrastructure is a precondition for economic growth and social development. The climate and topography of Norway puts great demands on the design and localization of buildings. The relationship between materials, structures and climatic impact is highly complex; illustrating the need for new and improved methods for vulnerability assessment of building envelope performance in relation to externally imposed climatic strains. Historically, major variations in climatic impact have led to corresponding large variations in building practice throughout the country - often well suited to local conditions. Today it is fair to say that sound building traditions and practice to some extent are being rejected in the quest for cost-effective solutions. Furthermore, projected changes in climatic conditions due to global warming will enhance the vulnerability within the built environment.
The primary objectives of the present dissertation are to increase the knowledge about possible impacts of climate change on building envelope performance, and to analyse and update methods for the planning and design of external envelopes in relation to climatic impact. This is accomplished through the development of integrated approaches and improved methods for assessing impacts of external climatic parameters on building envelopes, combining knowledge on materials, structures and relevant climate data, applicable for both historical data and scenarios for climate change. The results will contribute to more accurate building physics design guidelines, promoting high-performance building envelopes in harsh climates.
Approaches to assessments of the risks associated with climate change and buildings are suggested, identifying main areas of vulnerability in the construction industry. It is shown that there are benefits to be gained from the introduction of risk management strategies within a greater extent of the construction industry. A way of analysing the building economics of climate change is also proposed
Analyses of building defects are necessary in order to further develop tools, solutions and preventive measures ensuring high-performance building envelopes. To illuminate the vulnerability of different building envelope elements under varying climatic exposure, a comprehensive analysis of empirical data gathered from process induced building defect assignments is carried out. The amount of building defects in Norway clearly illustrates that it is not only the extreme weather events that need to be studied as a foundation for adaptation towards a changing climate. Furthermore, the analyses of defects reveal a fundamental need for climate differentiated design guidelines.
New and improved methods for geographically dependent design of building envelopes are proposed:
- A method for assessing the relative potential of frost decay or frost damage of porous, mineral building materials exposed to a given climate is developed.
- A national map of the potential for decay in wood structures is developed. Detailed scenarios for climate change for selected locations in Norway are used to provide an indication of the possible future development of decay rates.
- A method for assessing driving rain exposures based on multi-year records of synoptic observations of present weather, wind speed and direction is also presented.
These climate indices can be used as a tool for evaluation of changes in performance requirements or decay rates due to climate change under global warming incorporating data from regional- and local-level climate change scenarios. Historical records of climate data have finally been used to illuminate challenges arising when introducing international standards at the national level, without considering the need for adjustments to reflect varying local climatic conditions.
At present, building standards and design guidelines presuppose use of historic weather data. Historically, location-specific climate data have only to a very limited extent been applied systematically for design purposes, life cycle assessments, and climate differentiation of the suitability of a given technical solution in a given climate. The work is a first step towards methods and approaches allowing for geographically dependent climate considerations to be made in the development of design guidelines for high-performance building envelopes, and also approaches to assess the risks associated with the future performance of building envelopes due to climate change.
The dissertation focuses on methods for assessing impacts of external climatic parameters on a local scale, but with the use of daily and monthly averages of climate data. The reliability of climate indices or climate differentiated design guidelines is strongly dependent on the geographical spreading of the observing station network. The Norwegian network is not optimally distributed to fully embrace local variations, but provides a solid platform for the development of methods for geographically dependent design and guidelines on the appropriateness of different solutions in different climates.
Climate indices (using geographic information systems technology)allowing for quantitative assessment of building envelope performance or decay potential may be an important element in the development of adaptation measures to meet the future risks of climate change in different parts of the world. Finally, the work offers a conceptual point of departure for the development of a vintage model of the robustness of the Norwegian building stock.
Paper VII, IX, XI and XII reprinted with kind permission of Elsevier, sciencedirect.com
Rosettani, Matteo. « Algorithms and method for power management in HAS ». Doctoral thesis, Università Politecnica delle Marche, 2011. http://hdl.handle.net/11566/242008.
Texte intégralThere were many years that the possibility of uniforming the domotic system has been discussed, or rather the one relative to the automation of the house and it seems that we are proceeding to a period in which all the necessary factors for developing the Home Automation problematic will be available, in particular for those concerning the administration and the study of the logic that manages the house devices. The domotic, that is the set of technologies implemented to automate the house, is considered ready for the quality leap that would lead it out of the more traditional applications, also with big economical repercussions. The present worldwide market of the Home Automation industry has a total turnover of about 2.5 dollar billions, but within the 2014 it will be reach a value of 13.4 billions (source ING Direct). The smart home in addition with the concept of the Smart Grid appear, on the last annual report of the Consumer Electronics Association, as one of the rst ve technology to keep an eye on. However, it is necessary to consider a di erence between what the technologies allow to do and what an end-user could e ectively think to install at the moment. From the rst point of view, theoretically, it is all already done to realize a scenario in which the house installations are interconnected, dialogue with each other and with the users, eventually signal faults and, in some cases, anticipate the wishes of the owner. On the other hand, it is nevertheless true that the major white goods and home devices producers have not jet found an agreement about the communication standard to use for the data exchange among these appliances and, furthermore, the control policies relative to the coordination of the devices that have the objective of satisfying the end-user needs have not jet been de ned. This PhD thesis enters in the aforementioned topic, facing the just cited problems that characterize and limit the development of the Smart Home in the framework of the Smart grid programme, de ned and currently developed in Europe and United States. The approached thematics have been described distinguish them in two macro-areas: the rst one concerns the study and the analysis of the communication protocols to endow the house with a network in- frastructure needed to provide all the requests relative to the Home Automation. Thus, in a rst phase, the requisites for an home network infrastructure have been analyzed, such, for example, the energy consumption, the installation cost, the coverage range and the data transfer rate. In the following, an exhaustive analysis of the various communication protocols for the Home Automation has been done, focusing in particular in those ones candidate to become the HAN (Home Automation Network), complying with the speci cations de ned by the various Smart Grid consortium. Each one of these protocols has been compared with the requisites identi ed in the previous steps, creating a sort of classi cation on the basis of the accordance or less with these speci cations. At the end of this study, the candidate technologies for the role of HAN were three and, more speci cally, they were Bluetooth, ZigBee and the Lonworks protocol. After further tests, ZigBee prevailed among the two opponents, o ering a better correspondence with the Smart Grid requirements (Energy Pro le 2.0) and being already well accepted in the market as network infrastructure for the Home Automation. The second phase of this analysis was focused on the second problematic, relative to the control logic and coordination of the various devices that composes a typical household scenario. In particular, the rst section was concentrated on the de nition and determination of the needed theoretical framework for managing the two developed methods: it was showed the Woolridge approach to handle the MASs, modifying some aspects and concepts to comply them with the HASs class. Then, the analysis was focused on the study of the existent State of the Art, both for what concerns the the Multi Agent theory and that regarding the problematics relative to the resource allocation. These two developed methods have the purpose of resolving conflicts which can occur when the devices are trying to use shared resources in a typical household installation like, for example, the electricity and the hot water. The objective in resolving such conflicts consists in optimizing the whole system, trying to nd a functioning scheme of the various devices that can satisfy the demands and wishes of the end-user. Both the developed methods, called GT-HAS (Game Theoretic-HAS) and MKP-HAS (Multiperiod Knapsack Problem-HAS), use functions whose maximization permits to obtain locally and, given the properties of the built frameworks, also globally, performances that satisfy the preferences of the end-user. The analysis of this kind of problematic ends with the validation of the two methods, taking in exam some exemplifying scenarios and comparing the relative and absolute performances provided by GT-HAS and MKP-HAS.
Cichowski, Dawid [Verfasser], Peter [Akademischer Betreuer] Woias et Ingo [Akademischer Betreuer] Krossing. « Rapid fabrication methods and modular packaging of chip-based microreactors for harsh multiphase reactions ». Freiburg : Universität, 2017. http://d-nb.info/116814566X/34.
Texte intégralBowden, Michael Russell. « Family Impact and Infant Emotional Outcomes when an Infant Has Serious Liver Disease : A Longitudinal Mixed Methods Study ». Thesis, The University of Sydney, 2015. http://hdl.handle.net/2123/14702.
Texte intégralRidge, Helen E. « A multi-method study to investigate whether the pharmacist has a role on the neonatal unit ». Thesis, King's College London (University of London), 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.323152.
Texte intégralMusa, Ibrahim, et Charles Nordström. « “And so each and every teacher has to handle it to the best of their abilities” ». Thesis, Malmö universitet, Fakulteten för lärande och samhälle (LS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-28767.
Texte intégralBotha, Marinda. « The use of sandplay psychotherapy with an adolescent who has poor self-esteem ». Diss., University of Pretoria, 2010. http://hdl.handle.net/2263/25510.
Texte intégralDissertation (MEd)--University of Pretoria, 2010.
Educational Psychology
unrestricted
Livres sur le sujet "HASH METHODS"
Gottlieb, Adam. The art and science of cooking with cannabis : The most effective methods of preparing food & drink with marijuana, hashish & hash oil. Berkeley, Calif : Ronin Pub., 1993.
Trouver le texte intégralFain, Annika M. V. A comparison of water quality monitoring using Hach, LaMotte, and bench top methods. Bellingham, WA : Huxley College of Environmental Studies, Western Washington University, 1997.
Trouver le texte intégralWenn du willst, was du noch nie gehabt hast, dann tu, was du noch nie getan hast : Geschichten und Lebensweisheiten. Freiburg, Br : Herder, 2007.
Trouver le texte intégralRahman, Mizanur. Impact evaluation of the Mayer Hashi Program of long-acting and permanent methods of contraception in Bangladesh. Chapel Hill : Measure Evaluation, Carolina Population Center, 2014.
Trouver le texte intégralVoronin, Evgeniy, Aleksandr Chibunichev et Yuriy Blohinov. Reliability of solving inverse problems of analytical photogrammetry. ru : INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/2010462.
Texte intégralSpirin, Yuriy, Sergey Zotov, Evgeniy Krasnov et Nadezhda Cvetkova. Polder watercourses : research methods and geoecological assessment. ru : INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1903343.
Texte intégralNakov, Svetlin. Fundamentals of Computer Programming with C# : The Bulgarian C# Book. Sofia, Bulgaria : Svetlin Nakov, 2013.
Trouver le texte intégralKas'yanova, Svetlana, Viktoriya Saliy, Zinaida Sharudina, Oksana Madatova et Lyudmila Kucegreeva. Methodological aspects of the evaluation of the internal control system of the organization. ru : INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1907644.
Texte intégralKsenofontov, Boris, et Aleksandr Lukanin. Flotation combines for wastewater treatment with several working fluids. ru : INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1938077.
Texte intégralGREGORY, Lisa H. Essential Diy Cannabis Extracts : Beyond Cannabis Extracts : The Handbook to Diy Concentrates, Hash and Original Methods for Marijuana Extracts. Independently Published, 2020.
Trouver le texte intégralChapitres de livres sur le sujet "HASH METHODS"
van der Vegt, Steven, et Alfons Laarman. « A Parallel Compact Hash Table ». Dans Mathematical and Engineering Methods in Computer Science, 191–204. Berlin, Heidelberg : Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-25929-6_18.
Texte intégralPepper, Peter, Ralph Betschko, Sabine Dick et Klaus Didrich. « Realizing sets by hash tables ». Dans KORSO : Methods, Languages, and Tools for the Construction of Correct Software, 58–73. Berlin, Heidelberg : Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/bfb0015455.
Texte intégralMouha, Nicky. « Exploring Formal Methods for Cryptographic Hash Function Implementations ». Dans Information Security and Privacy, 177–95. Cham : Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-35486-1_9.
Texte intégralHai, Nguyen Minh, Quan Thanh Tho et Le Duc Anh. « Multi-threaded On-the-Fly Model Generation of Malware with Hash Compaction ». Dans Formal Methods and Software Engineering, 159–74. Cham : Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47846-3_11.
Texte intégralLiu, Huichuan, Yong Zeng, Jiale Liu, Zhihong Liu, Jianfeng Ma et Xiaoyan Zhu. « Perosonalized Differentially Private Location Collection Method with Adaptive GPS Discretization ». Dans Communications in Computer and Information Science, 175–90. Singapore : Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4922-3_13.
Texte intégralZhao, Na, et TianXiang Yue. « Modern HASM Method ». Dans High Accuracy Surface Modeling Method : The Robustness, 41–70. Singapore : Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4027-8_2.
Texte intégralWei, Xing, Huiqi Hu, Xuan Zhou et Aoying Zhou. « A Chunk-Based Hash Table Caching Method for In-Memory Hash Joins ». Dans Web Information Systems Engineering – WISE 2020, 376–89. Cham : Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62008-0_26.
Texte intégralLi, Fei, Hongzhi Wang, Liang Hao, Jianzhong Li et Hong Gao. « pq-Hash : An Efficient Method for Approximate XML Joins ». Dans Web-Age Information Management, 125–34. Berlin, Heidelberg : Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16720-1_13.
Texte intégralLi, Jiayi, Lulu Bei, Dan Li, Ping Cui et Kai Huang. « A Video Parallel Retrieval Method Based on Deep Hash ». Dans Simulation Tools and Techniques, 135–41. Cham : Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97124-3_12.
Texte intégralTsekouras, Vasileios, Sofia Mavrikou et Spyridon Kintzios. « Trends in Biosensors and Current Detection Methods for Stress Monitoring of Plants Growing in Adverse Environmental Conditions ». Dans Harsh Environment and Plant Resilience, 409–36. Cham : Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-65912-7_17.
Texte intégralActes de conférences sur le sujet "HASH METHODS"
van der Berg, Freark I., et Jaco van de Pol. « Concurrent Chaining Hash Maps for Software Model Checking ». Dans 2019 Formal Methods in Computer Aided Design (FMCAD). IEEE, 2019. http://dx.doi.org/10.23919/fmcad.2019.8894279.
Texte intégralKarabat, Cagatay, et Hakan Erdogan. « Biometric hash : A study on statistical quantization methods ». Dans 2012 20th Signal Processing and Communications Applications Conference (SIU). IEEE, 2012. http://dx.doi.org/10.1109/siu.2012.6204595.
Texte intégralMoreno, Pedro, Miguel Areias et Ricardo Rocha. « Memory Reclamation Methods for Lock-Free Hash Tries ». Dans 2019 31st International Symposium on Computer Architecture and High Performance Computing (SBAC-PAD). IEEE, 2019. http://dx.doi.org/10.1109/sbac-pad.2019.00039.
Texte intégralLuzhetsky, Volodymyr, et Yurii Baryshev. « Methods of generic attacks infeasibility increasing for hash functions ». Dans 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems : Technology and Applications (IDAACS). IEEE, 2013. http://dx.doi.org/10.1109/idaacs.2013.6663007.
Texte intégralRayatidamavandi, Maede, Yu Zhuang et Mahshid Rahnamay-Naeini. « A Comparison of Hash-Based Methods for Trajectory Clustering ». Dans 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech). IEEE, 2017. http://dx.doi.org/10.1109/dasc-picom-datacom-cyberscitec.2017.32.
Texte intégralSasao, Tsutomu, et Munehiro Matsuura. « An Implementation of an Address Generator Using Hash Memories ». Dans 2007 10th Euromicro Conference on Digital System Design : Architectures, Methods and Tools. IEEE, 2007. http://dx.doi.org/10.1109/dsd.2007.4341452.
Texte intégralLuo, Xiao, Daqing Wu, Zeyu Ma, Chong Chen, Minghua Deng, Jinwen Ma, Zhongming Jin, Jianqiang Huang et Xian-Sheng Hua. « CIMON : Towards High-quality Hash Codes ». Dans Thirtieth International Joint Conference on Artificial Intelligence {IJCAI-21}. California : International Joint Conferences on Artificial Intelligence Organization, 2021. http://dx.doi.org/10.24963/ijcai.2021/125.
Texte intégralNouri, Mahdi, Ali Khezeli, Alireza Ramezani et Azita Ebrahimi. « A dynamic chaotic hash function based upon circle chord methods ». Dans 2012 Sixth International Symposium on Telecommunications (IST). IEEE, 2012. http://dx.doi.org/10.1109/istel.2012.6483140.
Texte intégralKitsos, Paris, Nicolas Sklavos et Athanassios N. Skodras. « Low Power FPGA Implementations of 256-bit Luffa Hash Function ». Dans 2010 13th Euromicro Conference on Digital System Design : Architectures, Methods and Tools (DSD). IEEE, 2010. http://dx.doi.org/10.1109/dsd.2010.19.
Texte intégral« HYBRID STEGANOGRAPHY USING INDEX CHANNEL AND 2-3-3 HASH METHODS ». Dans International Conference on Research in Business management & Information Technology. ELK ASIA PACIFIC JOURNAL, 2015. http://dx.doi.org/10.16962/elkapj/si.it.icrbit-2015.25.
Texte intégralRapports d'organisations sur le sujet "HASH METHODS"
Yatsenko, Halyna, et Andriy Yatsenko. Використання креативних методів навчання під час викладання дисциплін «Історія української журналістики» і «Креативний текст». Ivan Franko National University of Lviv, mars 2023. http://dx.doi.org/10.30970/vjo.2023.52-53.11736.
Texte intégralKiefner, John, et Harvey Haines. IPC-04-02 Comparisons of Pipeline Integrity Assessment Methods. Chantilly, Virginia : Pipeline Research Council International, Inc. (PRCI), septembre 2002. http://dx.doi.org/10.55274/r0011828.
Texte intégralMasset, Edoardo, et Howard White. To boldly go where no evaluation has gone before : The CEDIL Evaluation Agenda. Centre for Excellence and Development Impact and Learning (CEDIL), juillet 2019. http://dx.doi.org/10.51744/ceap.
Texte intégralMahmoud, Hussam, Guillermo Riveros, Lauren Hudak et Emad Hassan. Experimental fatigue evaluation of underwater steel panels retrofitted with fiber polymers. Engineer Research and Development Center (U.S.), mars 2023. http://dx.doi.org/10.21079/11681/46647.
Texte intégralMills, Chris. PR-363-18604-Z01 Mass-Based Proving Methods for Mass Flow Meters. Chantilly, Virginia : Pipeline Research Council International, Inc. (PRCI), avril 2019. http://dx.doi.org/10.55274/r0011579.
Texte intégralLubkovych, Igor. METHODS OF JOURNALISTIC COMMUNICATION. Ivan Franko National University of Lviv, mars 2021. http://dx.doi.org/10.30970/vjo.2021.50.11096.
Texte intégralSingh, Anjali. Ultimate Guide to Automated Cell Counter : Plus Purchasing Tips. ConductScience, juin 2022. http://dx.doi.org/10.55157/cs20220614.
Texte intégralKiefner, Maxey et Eiber. L51607 Pipeline Coating Impedance Effect on Powerline Fault Current Coupling. Chantilly, Virginia : Pipeline Research Council International, Inc. (PRCI), janvier 1989. http://dx.doi.org/10.55274/r0010294.
Texte intégralCorscadden, Louise, et Anjali Singh. Grip Strength Test In Rodents. ConductScience, janvier 2023. http://dx.doi.org/10.55157/cs2023109.
Texte intégralGonzález-Montaña, Luis Antonio. Semantic-based methods for morphological descriptions : An applied example for Neotropical species of genus Lepidocyrtus Bourlet, 1839 (Collembola : Entomobryidae). Verlag der Österreichischen Akademie der Wissenschaften, novembre 2021. http://dx.doi.org/10.1553/biosystecol.1.e71620.
Texte intégral