„pattern application“
Suchergebnisse
4.204 Treffer
-
Pattern diversify patch antenna for sub-6 GHz 5G communication applications
-
Uncovering morphometric, germination, and genetic divergence patterns in Euterpe edulis for breeding and conservation applications
-
Application of artificial intelligence in assisting treatment of gynecologic tumors: a systematic review
-
Improved color texture recognition using multi-channel orthogonal moments and local binary pattern
-
Analysis and Application of Dynamic Patterns within the Context of Complaint Management
-
Application of Web Service Technologies on a B2B Communication Platform by Means of a Pattern and UML Based Software Development Process
-
PHP-MVC-Frameworks. Web Application Frameworks für die serverseitige Scriptsprache PHP
-
Hydrodynamics, numerical study and application of spouted bed
-
YOLOv11-PSP: an efficient lightweight instrument detection method for substation applications
-
Entstellende Bewuchsmuster nach einer Hydrophobierung/Disfiguring Biocolonization Patterns after the Application of Water Repellents
-
Multi-strategy boosted dung beetle optimizer and its applications for photovoltaic models and engineering applications
-
Minimally‐Invasive and In‐Vivo Hydrogel Patterning Method for In Situ Fabrication of Implantable Hydrogel Devices
-
Cloud-native applications – authoring and evaluation of two deployment patterns
-
A pattern language for modeling the provisioning of applications
-
Application of web service technologies on a b2b communication platform by means of a pattern and UML based software development process
-
Extending h5bench with I/O access patterns in common AI applications
-
Application of Design Patterns for modern JavaScript to solve real world problems
-
Comparison of different design patterns for Single Page Applications using the example of a Chat and Ticket management system
-
Detecting performance anti-patterns in enterprise applications by analyzing execution traces
-
Detecting performance anti-patterns in enterprise applications by analyzing execution traces