Intel
dc.date.accessioned | 2021-02-11T08:11:03Z | |
dc.date.available | 2021-02-11T08:11:03Z | |
dc.identifier.uri | https://directory.doabooks.org/handle/20.500.12854/40851 | |
dc.type | grantor | |
oapen.relation.funds | 767c539d-aaaa-4e7a-b84d-1537df0e6017 | |
oapen.relation.funds | 8e7d5e43-7b6c-4074-ad1a-ab7ad907e4ab | |
oapen.relation.funds | 74702b01-45d3-4c49-a3a8-4ce5babab69c | |
oapen.relation.funds | 5937b12e-8ef3-4dce-8128-ae4868731bf8 | |
oapen.relation.funds | e92ecbdb-a998-42cb-9360-891eb036e9fb | |
oapen.relation.funds | 1781adf6-cb5f-4895-b806-72d465ef3553 | |
oapen.relation.funds | b8b30f8a-a90a-408c-a2a5-87ba56c20e4e | |
oapen.relation.funds | e61c8810-4173-486d-a75c-073770b5c8f4 | |
oapen.relation.funds | 283a4501-a047-45c3-9ac6-5107667b14cc | |
oapen.relation.funds | 50176059-abd4-4866-bcf2-ac5a29991d86 | |
oapen.relation.funds | dd7281d6-18f4-4848-abdb-46b26fd4f107 | |
oapen.relation.funds | d9ada432-1b66-44bf-a531-63dab8515758 | |
oapen.relation.funds | 401c8771-10f4-4049-925a-ad722b0afb72 | |
oapen.relation.funds | 3b593309-e4d5-4581-82ec-7e49ee32c39f | |
oapen.relation.funds | 011581e3-ae5d-4d21-919f-3bdd81c79e01 | |
oapen.relation.funds | 5d51e2ca-c08a-4925-a24b-2ef8f8df21d0 | |
oapen.relation.funds | a43a044d-e5a2-415b-941f-faee771afed2 | |
oapen.relation.funds | 65855864-fe61-451f-9ce4-fac52d4e045e | |
oapen.relation.funds | 3642e903-449d-4efd-901e-5538c9603921 | |
oapen.relation.funds | 9bc09107-bf85-4d2d-b4b2-1e06c1a0d7f0 | |
oapen.relation.funds | b01bb83a-6872-4262-9b4d-3e44799af690 | |
oapen.relation.funds | 09470276-73c3-44d4-92cf-ca0076da13a5 | |
grantor.name | Intel | * |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |
This item appears in the following Collection(s)
Funded publications
-
(2013)Android on x86: an Introduction to Optimizing for Intel® Architecture serves two main purposes. First, it makes the case for adapting your applications onto Intel’s x86 architecture, including discussions of the business ...
-
(2013)Sensor Technologies: Healthcare, Wellness and Environmental Applications explores the key aspects of sensor technologies, covering wired, wireless, and discrete sensors for the specific application domains of healthcare, ...
-
(2013)Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise ...