Entrevista com Marina Mendo

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Estudio experimental de la efectividad de la entrevista abierta frente a la entrevista independiente de contexto

Resumen. OBJETIVO: Estudiar la efectividad relativa de las técnicas de entrevista abierta y entrevista independiente de contexto en la identificación de requisitos para sistemas software. MÉTODO: Experimento controlado ensayando dos factores: “tipo de entrevista” (abierta e independiente de contexto) y “tipo de problema” (identificación de requisitos para dos sistemas software distintos). Debid...

متن کامل

Iridoids from Avicennia marina.

Three new iridoid glucosides, 10-O-[(E)-cinnamoyl]-geniposidic acid, 10-O-[(E)-p-coumaroyl]-geniposidic acid, 10-O-[(E)-caffeoyl]-geniposidic acid and the known iridoid glucoside, 2'-O-[(E)-cinnamoyl]-mussaenosidic acid have been isolated from Avicennia marina. The structures were determined primarily by NMR spectroscopy. The assignment of NMR signals was performed by means of 1H-1H COSY, HMQC ...

متن کامل

45 - 49 Marina AM.pmd

A rapid method for quantitative analysis of free fatty acids in virgin coconut oil (VCO) was determined using Fourier transform infrared (FTIR) spectroscopy. Thirty training samples of VCO were prepared by spiking lauric acid to VCO samples covering a range of 0.1% to 5% of free fatty acids. FTIR spectra between 1730 and 1690 cm-1 was used for quantitative determination of free fatty acids. A p...

متن کامل

Visualization Dot Com

In this article, we explore the seemingly well-worn subject of distance-based, or remote visualization. Current practices in remote visualization tend to clump into two broad categories. One approach, which we’ll call render-remote, is to render an image remotely, then transmit the image to the user. Another option, render-local, transfers raw data to the user, where it is then visualized and r...

متن کامل

Criptografia com Curvas Elípticas

This paper presents an overview of the use of elliptic curves in cryptography. The security of this cryptosystem is based on the discrete logarithm problem, which appears to be much harder compared to the discrete logarithm problem in other cryptosystems. An overview of common cryptosystems is given, such as Diffie-Hellman and RSA, and an elliptic curve cryptography scheme is discussed. -------...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ILUMINURAS

سال: 2019

ISSN: 1984-1191

DOI: 10.22456/1984-1191.90187