The Used

Results: 46220



#Item
661

VLBA Sensitivity Upgrade Memo 42 rev. 1 Description of the VDIF format used by the VLBA, VLA and GBT including the VDIF Extended Data Version 3 definition

Add to Reading List

Source URL: library.nrao.edu

Language: English
    662

    I: Burglary The giant Candy-Bar Wall in the Royal Kitchen is used to store. . . well, candy bars. These are placed in jars on N equal-length shelves. The shelves are positioned in a vertical progression from the ground u

    Add to Reading List

    Source URL: swerc.eu

    Language: English - Date: 2018-02-20 09:46:35
      663

      IS CAPM AN EFFICIENT MODEL? ADVANCED VERSUS EMERGING MARKETS Iulian IHNATOV *, Nicu SPRINCEAN** Abstract: CAPM is one of the financial models most widely used by the investors all over the world for analyzing the correla

      Add to Reading List

      Source URL: cse.uaic.ro

      Language: English - Date: 2018-06-18 07:54:29
        664

        FIGURES ConTEXt XML Pragma ADE / Hasselt NL GoBack Previous Next Exit Within the TEX community there is a widely used database for bibliographic references, BIBTEX,

        Add to Reading List

        Source URL: www.pragma-ade.nl

        Language: English - Date: 2010-05-06 11:53:28
          665

          Application Engineer Who We Are: SmartUQ (SmartUQ.com) provides breakthrough analytics software to quantify uncertainty in simulations, testing, and complex engineering systems. Our software is used by some of the larges

          Add to Reading List

          Source URL: www.smartuq.com

          Language: English - Date: 2018-02-20 09:50:22
            666

            Supplementary  Figure  1:  The  annota5on  tool  used  by  the  biological  curators  to  evaluate  the     proposed  non-­‐interac5ons  of  Excerbt.  

            Add to Reading List

            Source URL: mips.helmholtz-muenchen.de

            - Date: 2013-08-27 16:51:00
              667

              Cyberstalking Although there is no universally accepted definition of cyberstalking, the term can be used to refer to the use of the Internet, email, or other electronic communications devices to stalk another person. St

              Add to Reading List

              Source URL: www.beverlypd.org

              Language: English - Date: 2013-09-13 13:22:51
                668

                1 Strongly Conflict-Avoiding Codes Yijin Zhang, Kenneth W. Shum and Wing Shing Wong Abstract— Strongly conflict-avoiding codes are used in the

                Add to Reading List

                Source URL: www.ie.cuhk.edu.hk

                Language: English - Date: 2011-10-18 21:10:17
                  669

                  TERMS OF SERVICE Content All the storage space and the services provided must be used for lawful purposes only. Any information, data or material in violation or contradiction of any United States Federal, State or City

                  Add to Reading List

                  Source URL: www.epowhost.com

                  Language: English - Date: 2010-01-28 19:21:23
                    UPDATE