Literatura científica selecionada sobre o tema "Collectors and collecting, computer network resources"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Collectors and collecting, computer network resources".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Artigos de revistas sobre o assunto "Collectors and collecting, computer network resources"

1

Osamy, Walid, Ahmed M. Khedr, Ahmed A. El-Sawy, Ahmed Salim e Dilna Vijayan. "IPDCA: Intelligent Proficient Data Collection Approach for IoT-Enabled Wireless Sensor Networks in Smart Environments". Electronics 10, n.º 9 (22 de abril de 2021): 997. http://dx.doi.org/10.3390/electronics10090997.

Texto completo da fonte
Resumo:
The Internet of Things (IoT) enables the interrelation of physical things and devices that can be accessed through the internet and it simply forms a single integrated network of various things. An IoT-facilitated smart city scenario spans several sectors, such as industrial applications, public transportation, smart grid, emergency services, health care, etc. In this paper, we propose an Intelligent Proficient Data Collection Approach (IPDCA) to deliver public data in a large-scale smart city set-up. IPDCA utilizes public vehicles as the mobile data collectors (D-collectors) that read (or collect) data from multiple Access Points (APs) and send them back to the central Base Station (BS). Moreover, IPDCA adopts a modified Bat algorithm for path finding of D-collectors, where we extend the Bat algorithm to solve our discrete optimization problem. Besides, for selecting D-collectors in smart city settings, we use a multi-objective fitness function that considers the count, travelled distance, and storage of D-collectors to ensure optimal use of resources. Efficiency of the proposed mechanism is proved through simulations.
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Senagi, Kennedy, e Henri E. Z. Tonnang. "A Novel Tightly Coupled Information System for Research Data Management". Electronics 11, n.º 19 (5 de outubro de 2022): 3196. http://dx.doi.org/10.3390/electronics11193196.

Texto completo da fonte
Resumo:
Most research projects are data driven. However, many organizations lack proper information systems (IS) for managing data, that is, planning, collecting, analyzing, storing, archiving, and sharing for use and re-use. Many research institutions have disparate and fragmented data that make it difficult to uphold the FAIR (findable, accessible, interoperable, and reusable) data management principles. At the same time, there is minimal practice of open and reproducible science. To solve these challenges, we designed and implemented an IS architecture for research data management. Through it, we have a centralized platform for research data management. The IS has several software components that are configured and unified to communicate and share data. The software components are, namely, common ontology, data management plan, data collectors, and the data warehouse. Results show that the IS components have gained global traction, 56.3% of the total web hits came from news users, and 259 projects had metadata (and 17 of those also had data resources). Moreover, the IS aligned the institution’s scientific data resources to universal standards such as the FAIR principles of data management and at the same time showcased open data, open science, and reproducible science. Ultimately, the architecture can be adopted by other organizations to manage research data.
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Ahmed, Wasim, e Sergej Lugovic. "Social media analytics: analysis and visualisation of news diffusion using NodeXL". Online Information Review 43, n.º 1 (11 de fevereiro de 2019): 149–60. http://dx.doi.org/10.1108/oir-03-2018-0093.

Texto completo da fonte
Resumo:
Purpose The purpose of this paper is to provide an overview of NodeXL in the context of news diffusion. Journalists often include a social media dimension in their stories but lack the tools to get digital photos of the virtual crowds about which they write. NodeXL is an easy to use tool for collecting, analysing, visualising and reporting on the patterns found in collections of connections in streams of social media. With a network map patterns emerge that highlight key people, groups, divisions and bridges, themes and related resources. Design/methodology/approach This study conducts a literature review of previous empirical work which has utilised NodeXL and highlights the potential of NodeXL to provide network insights of virtual crowds during emerging news events. It then develops a number of guidelines which can be utilised by news media teams to measure and map information diffusion during emerging news events. Findings One emergent software application known as NodeXL has allowed journalists to take “group photos” of the connections among a group of users on social media. It was found that a diverse range of disciplines utilise NodeXL in academic research. Furthermore, based on the features of NodeXL, a number of guidelines were developed which provide insight into how to measure and map emerging news events on Twitter. Social implications With a set of social media network images a journalist can cover a set of social media content streams and quickly grasp “situational awareness” of the shape of the crowd. Since social media popular support is often cited but not documented, NodeXL social media network maps can help journalists quickly document the social landscape utilising an innovative approach. Originality/value This is the first empirical study to review literature on NodeXL, and to provide insight into the value of network visualisations and analytics for the news media domain. Moreover, it is the first empirical study to develop guidelines that will act as a valuable resource for newsrooms looking to acquire insight into emerging news events from the stream of social media posts. In the era of fake news and automated accounts, i.e., bots the ability to highlight opinion leaders and ascertain their allegiances will be of importance in today’s news climate.
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Mardianto, Is, Dedy Sugiarto e Krisna Aditama Ashari. "The Elastic Stack Ability Test To Monitor Slowloris Attack on Digital Ocean Server". Ultimatics : Jurnal Teknik Informatika 13, n.º 2 (23 de janeiro de 2022): 120–26. http://dx.doi.org/10.31937/ti.v13i2.2209.

Texto completo da fonte
Resumo:
Servers have a central role in computer network. The server is in charge of serving user requests with various types of services. Every server activity in handling these things will generate different types of logs. Information from this large amount of logs is often ignored and has not been widely used as material for analyzing the performance of the server itself. In this study, Elastic Stack is functioned as a system that handles upstream to downstream processes starting from collection, transformation, and storage as well as graphical visualization of the Nginx web server given an attack scenario in the form of massive incoming connection requests and server login access attempts. The Elastic Stack components used as log collectors are Filebeat and Metricbeat for system metric data. For testing attacks using the Slowloris tool which will consume web server resources. The results of the research that have been carried out are when there are 500 incoming connections, the web server can serve requests normally, at 1000 connections there are some packets that are not served, the server becomes unable to access when it reaches a total of 2000 incoming connections. Metric data in the form of CPU Usage and Memory Usage are affected, although not significantly. Identification of IP Address shows the source of the attack comes from Singapore, according to the domicile of the attacker's computer. All access data in the form of username, time, origin of region trying to enter the server are recorded by the system.
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Hamby, Rogan, e Andrea Buntz Neiman. "A tiny library with a million volumes: Open-source resource sharing with fulfillment interlibrary loan (ILL)". Information Services & Use 43, n.º 3-4 (15 de dezembro de 2023): 285–88. http://dx.doi.org/10.3233/isu-230222.

Texto completo da fonte
Resumo:
his paper is based upon a lightning talk given at the NISO Plus conference on February 14, 2023 and it describes interlibrary Loan syste4m, Fulfillment, developed by the Equinox Open Library Initiative. A thriving resource-sharing consortium allows libraries to offer broader and deeper opportunities for individual learning and greater community equity. It unlocks access to additional copies beyond what an owning library has available, along with a broad range of content owned within the network, which provides a diverse collection for library users. Providing access to such a rich network of resources is the goal of Fulfillment, an open-source resource sharing system which breaks down barriers to sharing collections.
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Sulistyo, Wahyu Djoko, Wahyudi Deny Yudo, Jalani Azmi Bin Muhamad @Md., Putra Candra Kurnia e Hartono. "The Effectiveness of Laboratory Digitalization for 21st Century Learning". International Journal of Interactive Mobile Technologies (iJIM) 18, n.º 04 (27 de fevereiro de 2024): 48–64. http://dx.doi.org/10.3991/ijim.v18i04.46353.

Texto completo da fonte
Resumo:
Learning resources are crucial and strategic elements that impact the accessibility of easy, fast, accurate, and affordable information in the era of Society 5.0. Learning resources must be adaptable to technological advancements. The history laboratory is a learning resource that must be transformed and adapted to address the aforementioned needs and problems as a solution. The extensive collection of owned items has the potential to support this. This paper describes the creation of a digital laboratory by utilizing collections from the UM History Department. The research employed the Research and Development (R&D) method, utilizing the ADDIE model, which includes the stages of analysis, design, development, implementation, and evaluation. The study presents findings on the importance of digitizing laboratories as educational resources and digital laboratory products for the UM History Department. This digital laboratory product consists of several features, including an e-book (book catalog), an e-repository (final project catalog), an e-museum (museology collection catalog), tool lending, and graduate assessment. The results of the validation and implementation tests demonstrate that the criteria are highly valid and extremely effective. These results demonstrate that the digital laboratory serves as a more effective and efficient learning resource that is easily accessible and usable for civil society 5.0.
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Garrido-Muñoz , Ismael, Arturo Montejo-Ráez , Fernando Martínez-Santiago  e L. Alfonso Ureña-López . "A Survey on Bias in Deep NLP". Applied Sciences 11, n.º 7 (2 de abril de 2021): 3184. http://dx.doi.org/10.3390/app11073184.

Texto completo da fonte
Resumo:
Deep neural networks are hegemonic approaches to many machine learning areas, including natural language processing (NLP). Thanks to the availability of large corpora collections and the capability of deep architectures to shape internal language mechanisms in self-supervised learning processes (also known as “pre-training”), versatile and performing models are released continuously for every new network design. These networks, somehow, learn a probability distribution of words and relations across the training collection used, inheriting the potential flaws, inconsistencies and biases contained in such a collection. As pre-trained models have been found to be very useful approaches to transfer learning, dealing with bias has become a relevant issue in this new scenario. We introduce bias in a formal way and explore how it has been treated in several networks, in terms of detection and correction. In addition, available resources are identified and a strategy to deal with bias in deep NLP is proposed.
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Kiejziewicz, Agnieszka. "Kolekcjonowanie popkultury. Kilka słów o archiwizacji anime i japońskich filmowych memorabiliach". Studia Filmoznawcze 42 (1 de agosto de 2022): 5–16. http://dx.doi.org/10.19195/0860-116x.42.1.

Texto completo da fonte
Resumo:
The presented article concerns the issue of collecting film memorabilia, with a particular emphasis on the Japanese artefacts related to anime production. Beginning with a brief introduction to the differences between collections and archives, the author aims to present the current state of research on the categorization of popular culture memorabilia. The following parts of the article underline the importance of considering Japanese post-animation products as historical resources. Regarding the ways of presentation of selected works in galleries, the author provides such case-study examples of exhibitions as A World Is Born: The Emerging Arts and Designs in 1980s Japanese Animation (Singapore 2018, Stockholm 2019) and Proto Anime Cut — Spaces and Visions in Japanese Animation (International, 2011–2012). A significant part of the article is devoted to the description and analysis of the presence of Japanese anime memorabilia in European and Polish collections, which shows the rapid development of interest in collecting popular culture.
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Meelen, Marieke, Élie Roux e Nathan Hill. "Optimisation of the Largest Annotated Tibetan Corpus Combining Rule-based, Memory-based, and Deep-learning Methods". ACM Transactions on Asian and Low-Resource Language Information Processing 20, n.º 1 (abril de 2021): 1–11. http://dx.doi.org/10.1145/3409488.

Texto completo da fonte
Resumo:
This article presents a pipeline that converts collections of Tibetan documents in plain text or XML into a fully segmented and POS-tagged corpus. We apply the pipeline to the large extent collection of the Buddhist Digital Resource Center. The semi-supervised methods presented here not only result in a new and improved version of the largest annotated Tibetan corpus to date, the integration of rule-based, memory-based, and neural-network methods also serves as a good example of how to overcome challenges of under-researched languages. The end-to-end accuracy of our entire automatic pipeline of 91.99% is high enough to make the resulting corpus a useful resource for both linguists and scholars of Tibetan studies.
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Ally, Juma. "Group-Based Data Offloading Techniques Assisted by D2D Communication in 5G Mobile Network". Tanzania Journal of Engineering and Technology 41, n.º 2 (30 de junho de 2022): 52–69. http://dx.doi.org/10.52339/tjet.v41i2.778.

Texto completo da fonte
Resumo:
Machine type communication devices proposed as one of the substantial data collections in the 5G of wireless networks. However, the existing mobile communication network is not designed to handle massive access from the MTC devices instead of human type communication. In this context, we propose the device-to-device communication assisted a mobile terminal (smartphone) on data computing, focusing on data generated from a correlated source of machine type communication devices. We consider the scenario that the MTC devices after collecting the data will transmit to a smartphone for computing. With the limitation of computing resources at the smartphone, some data are offloaded to the nearby mobile edge-computing server. By adopting the sensing capability on MTC devices, we use a power exponential function to compute a correlation coefficient existing between the devices. Then we propose two grouping techniques K-Means and hierarchical clustering to combine only the MTC devices, which are spatially correlated. Based on this framework, we compare the energy consumption when all data processed locally at a smartphone or remotely at mobile edge computing server with optimal solution obtained by exhaustive search method. The results illustrated that; the proposed grouping technique reduce the energy consumption at a smartphone while satisfying a required completion time.
Estilos ABNT, Harvard, Vancouver, APA, etc.

Teses / dissertações sobre o assunto "Collectors and collecting, computer network resources"

1

Monostori, Krisztian 1975. "Efficient computational approach to identifying overlapping documents in large digital collections". Monash University, School of Computer Science and Software Engineering, 2002. http://arrow.monash.edu.au/hdl/1959.1/8756.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Livros sobre o assunto "Collectors and collecting, computer network resources"

1

Susan, Koppelman, e Franks Alison 1944-, eds. Collecting and the Internet: Essays on the pursuit of old passions through new technologies. Jefferson, N.C: McFarland & Co., 2008.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Heim, Judy. Free stuff for collectors on the Internet. Lafayette, Calif: C & T Pub., 2000.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Hix, Nancy L. Collector's guide to buying, selling, and trading on the Internet. 2a ed. Paducah, Ky: Collector Books, 2000.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Hix, Nancy L. Collector's guide to buying, selling, and trading on the Internet. Paducah, Ky: Collector Books, 1999.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Felixmüller, Maria L. Produktive Unordnung: Metamorphosen der Wunderkammer bei Aby M. Warburg und im Internet. Springe: Zu Klampen!, 2018.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

George Mason University. Center for History and New Media., ed. Exploring & collecting history online: Echo : science, technology, and industry. Fairfax, Va: Center for History and New Media, George Mason University, 2005.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

1949-, Conkling Thomas W., e Musser Linda R, eds. Engineering libraries: Building collections and delivering services. Binghamton, N.Y: Haworth Information Press, 2001.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Basbanes, Nicholas A. Among the gently mad: Perspectives and strategies for the book hunter in the twenty-first century. New York: Henry Holt and Co., 2002.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Bicentennial Conference on Bibliographic Control for the New Millennium (2000 Washington, D.C.). Confronting the challenges of networked resources and the Web. [Washington, D.C.]: Library of Congress, 2000.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

M, Sandberg-Fox Ann, e Library of Congress. Cataloging Directorate., eds. Proceedings of the Bicentennial Conference on Bibliographic Control for the New Millennium: Confronting the challenges of networked resources and the Web : Washington, D.C., November 15-17, 2000. Washington, DC: Library of Congress, Cataloging Distribution Service, 2001.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Capítulos de livros sobre o assunto "Collectors and collecting, computer network resources"

1

Yang, Bo. "Multimedia Representation". In Encyclopedia of Multimedia Technology and Networking, Second Edition, 995–1007. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-014-1.ch135.

Texto completo da fonte
Resumo:
In recent years, the rapid expansion of multimedia applications, partly due to the exponential growth of the Internet, has proliferated over the daily life of computer users (Yang & Hurson, 2006). The integration of wireless communication, pervasive computing, and ubiquitous data processing with multimedia database systems has enabled the connection and fusion of distributed multimedia data sources. In addition, the emerging applications, such as smart classroom, digital library, habitat/environment surveillance, traffic monitoring, and battlefield sensing, have provided increasing motivation for conducting research on multimedia content representation, data delivery and dissemination, data fusion and analysis, and contentbased retrieval. Consequently, research on multimedia technologies is of increasing importance in computer society. In contrast with traditional text-based systems, multimedia applications usually incorporate much more powerful descriptions of human thought—video, audio, and images (Karpouzis, Raouzaiou, Tzouveli, Iaonnou, & Kollias, 2003; Liu, Bao, Yu, & Xu, 2005; Yang & Hurson, 2005). Moreover, the large collections of data in multimedia systems make it possible to resolve more complex data operations such as imprecise query or content-based retrieval. For instance, the image database systems may accept an example picture and return the most similar images of the example (Cox, Miller, & Minka, 2000; Hsu, Chua, & Pung, 2000; Huang, Chang, & Huang, 2003). However, the conveniences of multimedia applications come with challenges to the existing data management schemes: • Efficiency: Multimedia applications generally require more resources; however, the storage space and processing power are limited in many practical systems, for example, mobile devices and wireless networks (Yang & Hurson, 2005). Due to the large data volume and complicated operations of multimedia applications, new methods are needed to facilitate efficient representation, retrieval, and processing of multimedia data while considering the technical constraints. • Semantic Gap: There is a gap between user perception of multimedia entities and physical representation/access mechanism of multimedia data. Users often browse and desire to access multimedia data at the object level (“entities” such as human beings, animals, or buildings). However, the existing multimedia retrieval systems tend to access multimedia data based on their lower-level features (“characteristics” such as color patterns and textures), with little regard to combining these features into data objects. This representation gap often leads to higher processing cost and unexpected retrieval results. The representation of multimedia data according to human’s perspective is one of the focuses in recent research activities; however, few existing systems provide automated identification or classification of objects from general multimedia collections. • Heterogeneity: The collections of multimedia data are often diverse and poorly indexed. In a distributed environment, because of the autonomy and heterogeneity of data sources, multimedia data objects are often represented in heterogeneous formats. The difference in data formats further leads to the difficulty of incorporating multimedia data objects under a unique indexing framework. • Semantic Unawareness: The present research on content-based multimedia retrieval is based on feature vectors—features are extracted from audio/video streams or image pixels, empirically or heuristically, and combined into vectors according to the application criteria. Because of the application-specific multimedia formats, the feature-based paradigm lacks scalability and accuracy.
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Xie, Iris. "Interactive IR in Digital Library Environments". In Interactive Information Retrieval in Digital Environments, 116–52. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-240-4.ch005.

Texto completo da fonte
Resumo:
For centuries, people have been used to printed materials. The emergence of the Internet brings dramatic changes to millions of people in terms of how they collect, organize, disseminate, access, and use information. Researchers (Chowdhury & Chowdhury, 2003; Lesk, 2005; Witten & Bainbridge, 2003) have identified the following factors that contributed to the birth of digital libraries: 1. Vannevar Bush’s pioneering concept and idea of Memex. Vannevar Bush (1945) wrote a classic article, “As We May Think,” which has had a major impact on the emergence of digital libraries. In the article, he described his Memex device, which was able to organize books, journals, and notes in different places by linked association. This associative linking was similar to what is known today as hypertext. 2. The advancement in computer and communication/network technology. The computer was first used to manage information. In the 1960s, the emergence of remote online information search services changed the way people access and search information. By the 1980s, people could remotely and locally access library catalogues via Online Public Access Catalogues (OPACs). The invention of the CD-ROM made it easy and cheap for users to access electronic information. Most importantly, Web technology started in 1990, and the occurrence of Web browsers afterwards have enabled users to access digital information anywhere as long as there is an Internet connection. Web search engines offer an opportunity for millions of people to search full-text documents on the Web. 3. The development of libraries and library access. Since the creation of Alexandrian library around 300 B.C., the size and number of libraries have grown phenomenally. A library catalogue goes from a card catalogue to three generations of online public access catalogues started in the 1980s. Library materials include mainly printed resources to multimedia collections, such as images, videos, sound files, and so forth. Simultaneously, the information explosion in the digital age makes it impossible for libraries to collect all of the available materials.
Estilos ABNT, Harvard, Vancouver, APA, etc.

Trabalhos de conferências sobre o assunto "Collectors and collecting, computer network resources"

1

Albeanu, Grigore. "BUIDING AN UNDERGRADUATE COURSE IN DATA-DRIVEN METHODOLOGIES". In eLSE 2017. Carol I National Defence University Publishing House, 2017. http://dx.doi.org/10.12753/2066-026x-17-182.

Texto completo da fonte
Resumo:
A data specialist is an emerging professional profile oriented towards collection, filtering, analysis, visualization, management and preservation of huge collections of information. Even some tasks of database managers, computer programmers, or statistical data analysers are common for a "data scientist", many other skills are required. A data scientist should be, as possible as, a quantitative analyst, a data management expert, and should have a solid foundation in math, statistics, probability, and computer science and strong social skills. This paper describes the architecture of an undergraduate course in data-driven methodologies, an advanced one, making use of fundamental knowledge and introducing new topics coming from cloud development and big data processing. The following tracks are considered: data management, data analytics and pattern discovery, modern data bases and distributed systems, mathematics and statistical software packages, econometry and quantitative finance, operational research, computational social science, social network and graph analysis, soft computing based decision making, data analysis fields, data science open source tools etc. Twelve chapters will address the planned content based on demonstrative projects using Hadoop, MapReduce, R, and Python packages. The allocated time is 56 hours, with 28 hours of lectures. Also, the data scientist profession is defined according to the market reaction. To fulfil the objective, various open resources are identified and linked to a digital front-end of the course. In conclusion, the aim of the project is to offer such a course in a blended manner, in order to create the need for a professional master program in data science.
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

R. Ahmed, Muhammad, Thirein Myo e Badar Al Baroomi. "The Challenges and Viability of using Blockchain for WSN Security". In 9th International Conference on Computer Networks & Communications (CCNET 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.120302.

Texto completo da fonte
Resumo:
Wireless Sensor Network (WSN) comprises of cheap and multifunctional resources constrain nodes that communicate at a fair distances through wireless connections. It is open media and underpinned by an application scenario for data collecting and processing. It can be used for many exclusive applications range from military implementation inside the battlefield, environmental tracking, fitness quarter as well as emergency response of surveillance. With its nature and application scenario, protection of WSN had drawn an attention. It is understood that the sensor nodes are valuable to the attacks because of the construction nature of the sensor nodes and distributed network infrastructure. In order to ensure its capability especially in malicious environments, security mechanisms are essential. In this paper, we have discussed the challenges and the viability of the blockchain to implement in the WSN in order to protect WSN from the attacks.
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!

Vá para a bibliografia