Showing 201 - 220 results of 221 for search 'COMPUTER PROGRAMMING', query time: 0.69s Refine Results
  1. 201
    by Khare, Arjun
    Published 2014
    ...<p>The actor model provides a framework for writing concurrent programs. ACT...
    Get full text
    Get full text
    Dissertation
  2. 202
    by Ringenbach, Michael
    Published 2014
    ... well a given program is meeting the learning outcomes the accreditation board uses in its assessment...
    Get full text
    Get full text
    Others
  3. 203
    by Steele, Robert Joshua
    Published 2014
    ... program is discussed, including overall program structure, graphical user interface components...
    Get full text
    Get full text
    Others
  4. 204
    by Conklin, Nathan James
    Published 2014
    ...Information visualizations must often be custom programmed to support complex user tasks...
    Get full text
    Get full text
    Others
  5. 205
    by Liu, Mingming
    Published 2016
    ... many programs have been developed to predict the effect of SNPs, few can be used to predict the effect...
    Get full text
    Others
  6. 206
    by Tumati, Pradeep
    Published 2014
    ..., and demonstrates dynamic modification with a simple prototype Hot Swapping program. === Master of Science...
    Get full text
    Get full text
    Others
  7. 207
    by Christian, Jason L.
    Published 2014
    ...Although networked-based computational environments such as Linda-LAN provide parallel processing...
    Get full text
    Get full text
    Dissertation
  8. 208
    by McConnell, William Charles
    Published 2014
    ... on computers. Most attacks, including the more dangerous ones, directly target program vulnerabilities...
    Get full text
    Get full text
    Others
  9. 209
    by Page, Ernest H.
    Published 2014
    ... in applications designed under the program generation approach. The Conical Methodology provides the Conceptual...
    Get full text
    Get full text
    Others
  10. 210
    by Liu, Fang
    Published 2017
    ... and electronic computers. In the recent 30 years, researchers have developed various tools to protect...
    Get full text
    Others
  11. 211
    by Keenan, Susan Lynn
    Published 2014
    ...Although research and practice have shown that the success of a usability engineering program...
    Get full text
    Get full text
    Others
  12. 212
    by Maxwell, Evan Kyle
    Published 2014
    ... program is a common strategy used in memory leak diagnosis, but our work is the first to employ a graph...
    Get full text
    Get full text
    Others
  13. 213
    by Cowan, KC Kaye
    Published 2020
    ... program that observes and collects information about network packets. We analyze and classify...
    Get full text
    Others
  14. 214
    by Bhasker, Bharat
    Published 2014
    ..., applicable to the relational and non-relational databases, that decomposes a query by computing all...
    Get full text
    Get full text
    Others
  15. 215
    by Wang, Pei
    Published 2021
    .... Cybergrooming has been recognized as a serious social problem. However, there have been insufficient programs...
    Get full text
    Others
  16. 216
    ...) techniques help software developers to locate faults by providing a ranked set of program elements. The focus...
    Get full text
    Others
  17. 217
    by Randhawa, Ranjit
    Published 2014
    ... and reproduction, movement, signal reception and response, and programmed cell death. The full complexity...
    Get full text
    Get full text
    Others
  18. 218
    by Li, Zheng
    Published 2020
    ... the hidden patterns of data and make appropriate decisions without being explicitly programmed. Nevertheless...
    Get full text
    Others
  19. 219
    by Afzalan, Milad
    Published 2020
    .../personalized targeting for energy programs. However, building energy segmentation methodologies may present...
    Get full text
    Others
  20. 220
    by Lazem, Shaimaa
    Published 2014
    ... are programmed objects that take advantage of the available computational services (e.g., cloud-based services...
    Get full text
    Get full text
    Others