Pterostichus fenyesi fenderi

Known as: Pterostichus (Leptoferonia) fenyesi fenderi, Pterostichus fenyesi fenderi Hacker 
 
National Institutes of Health

Topic mentions per year

Topic mentions per year

1996-2017
01219962017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Studies of fire as a management tool often focus on how fire alters microclimate and affects plant quality. While these processes… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2009
2009
One of the most significant unsolved problems for network managers and system administrators is how to repair a network… (More)
Is this relevant?
2008
2008
One of the most significant unsolved problems for network managers and system administrators is how to repair a network… (More)
Is this relevant?
2007
2007
  • S. Kunika
  • Deutsche Zeitschrift für Chirurgie
  • 2007
Seitdem die erste erfolgreiche Operation des carcinomat6sen Pylorus durch B il 1 r o t h ausgefiihrt worden ist, sind schon mehr… (More)
Is this relevant?
2006
2006
Healthcare informatics affirm that healthcare presents most problems of user control with disparate, individualized and often… (More)
Is this relevant?
2005
2005
Recovery of endangered species in highly fragmented habitats often requires habitat restoration. Selection of restoration sites… (More)
  • figure 1
  • table 1
  • table 2
  • figure 2
  • figure 3
Is this relevant?
Review
2003
Review
2003
General Interest How the Internet Works, 7th ed., Preston Gralla (Que, 2004, 368 pp., ISBN 0-78972973-3, $29.99; www… (More)
Is this relevant?
1999
1999
As grassland habitats become degraded, declines in juvenile and adult food resources may limit populations of rare insects… (More)
  • table 1
  • table 2
  • table 3
  • figure 1
Is this relevant?
Highly Cited
1996
Highly Cited
1996
Many popular programs, such as Netscape, use untrusted helper applications to process data from the network. Unfortunately, the… (More)
  • figure 1
Is this relevant?
1996
1996
Many popular programs, such as Netscape, use un-trusted helper applications to process data from the network. Unfortunately, the… (More)
  • figure 1
Is this relevant?