Zobrazeno 1 - 10
of 73
pro vyhledávání: '"Nieto, Juan M."'
Autor:
Carrillo-Aleman, Luna, Agamez-Luengas, Angel Andres, Guia, Miguel, Renedo-Villarroya, Ana, Alonso-Fernández, Nuria, Lopez-Gomez, Laura, Bayoumy-Delis, Pablo, Sanchez-Nieto, Juan M., Pascual-Figal, Domingo, Carrillo-Alcaraz, Andrés
Publikováno v:
In Revista Portuguesa de Cardiologia May 2024 43(5):259-273
Autor:
Carrillo-Aleman, Luna, Carrasco-Gónzalez, Elena, Araújo, Maria João, Guia, Miguel, Alonso-Fernández, Nuria, Renedo-Villarroya, Ana, López-Gómez, Laura, Higon-Cañigral, Aurea, Sanchez-Nieto, Juan M., Carrillo-Alcaraz, Andrés
Publikováno v:
In Journal of Critical Care June 2022 69
Publikováno v:
In Current Topics in Developmental Biology 2018 128:339-363
Publikováno v:
Lecture Notes in Computer Science
Timed-release cryptography addresses the problem of “sending messages into the future”: information is encrypted so that it can only be decrypted after a certain amount of time, either (a) with the help of a trusted third party time server, or (b
Pteroclorini or Pterochlorini? Mordvilko (1914) established the tribe name “ Pterochlorini ”, Pterochlorus Passerini being the name-bearing genus. However, Pterochlorus is an unjustified emendation of Pteroclorus Rondani, 1848 (Passerini 1860), a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fe8b079880dcf86c581e470327682ea4
Is Tycheinae an aphid taxon? Koch (1857) described the genus Tychea and two species: Tychea graminis (pages 298-299, figures 365, 366 a, 366 b) and Tychea amycli (page 300, figure 367). The descriptions and illustrations are not detailed enough to cl
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fe753fb5a9c09227e360bf1bbd9f1285
Contactless real time measuring system for the length of sheets in stainless steel production lines.
Autor:
Canero-Nieto, Juan M., Spinola, Carlos G., Moreno-Aranda, Gonzalo, Bonelo, Jose M., Martin-Vazquez, Manuel
Publikováno v:
2012 IEEE International Instrumentation & Measurement Technology Conference Proceedings; 1/ 1/2012, p2295-2299, 5p
Publikováno v:
Information Security & Privacy (9783540265474); 2005, p572-583, 12p
Publikováno v:
Information Security & Privacy (9783540265474); 2005, p560-571, 12p
Publikováno v:
Information Security & Privacy (9783540265474); 2005, p548-559, 12p