Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
programming programming » programming programmed, programming program
exploiting programming » exploring programming, evaluating programming, existing programming
interfaces exploiting » interface exploring, intersafe exploiting, interfaces explorations
programming context » programming contest, programming convex, programming concept
context https » context helps, concepts https, control https
programming programming » programming programmed, programming program
exploiting programming » exploring programming, evaluating programming, existing programming
interfaces exploiting » interface exploring, intersafe exploiting, interfaces explorations
programming context » programming contest, programming convex, programming concept
context https » context helps, concepts https, control https
1
Published 2014
Table of Contents:
“... Prediction -- Multi-context logics-a general introduction -- Constraint programming for context comprehension...”View full text
Electronic
eBook
2
Published 2006
Table of Contents:
“... Approach -- Performance Tools for Parallel Programming -- High-Performance Parallel I/O -- Hybrid MPI...”View full text
Electronic
eBook
3
Published 2006
Table of Contents:
“...Context-Awareness and Coordination -- Policy-Driven Configuration and Management of Agent Based...”View full text
Electronic
eBook
4
Published 2006
Table of Contents:
“... -- Wrapping PDF Documents Exploiting Uncertain Knowledge -- Supporting Customised Collaboration over Shared...”View full text
Electronic
eBook
5
Published 2011
Table of Contents:
“... Exploration in Search Computing -- Trends in Search Interaction -- Interaction Design:- Context and Action...”View full text
Electronic
eBook
6
Published 2012
Table of Contents:
“...-Valued Logics for Incomplete Information and Epistemic Logic -- Exploiting Unfounded Sets for HEX-Program...”View full text
Electronic
eBook
7
Published 2008
Table of Contents:
“... Automated Trading -- Genetic Programming in Statistical Arbitrage -- Evolutionary System for Generating...”View full text
Electronic
eBook
8
Published 2007
Table of Contents:
“... and Ontologies -- Exploiting Context Information for Identification of Relevant Experts in Collaborative...”View full text
Electronic
eBook
9
Published 2005
Table of Contents:
“... Mobile Agent Platform -- What Is Context and How Can an Agent Learn to Find and Use it When Making...”View full text
Electronic
eBook
10
Published 2012
Table of Contents:
“...21st Century Learning for 21st Century Skills: What Does It Mean, and How Do We Do It -- Exploiting...”View full text
Electronic
eBook
11
Published 2010
Table of Contents:
“... -- Characterizing the Effectiveness of Tutorial Dialogue with Hidden Markov Models -- Exploiting Predictable...”View full text
Electronic
eBook
12
Published 2008
Table of Contents:
“... Learning Environment -- Eeney, Meeney, Miney, Mo? Selecting a First Programming Language -- Exploiting ICT...”View full text
Electronic
eBook
13
Published 2005
Table of Contents:
“... Programming Driven by User Models -- Data-Driven Refinement of a Probabilistic Model of User Affect...”View full text
Electronic
eBook
14
Published 2007
Table of Contents:
“... Management in Mobile Systems -- An Empirical Study of the Potential for Context-Aware Power Management...”View full text
Electronic
eBook
15
Published 2007
Table of Contents:
“...: The Present and the Future -- Full Papers -- Exploiting Evidence Analysis in Plan Recognition -- Modeling...”View full text
Electronic
eBook
16
Published 2010
Table of Contents:
“... for Virtualized Grid Infrastructures -- Sensor Networks -- Distributed Object-Oriented Programming with RFID...”View full text
Electronic
eBook
17
Published 2006
Table of Contents:
“... -- Exploiting Passive Advantages of Sentient Artefacts -- Scenario-Based Programming for Ubiquitous Applications...”View full text
Electronic
eBook
18
Published 2008
Table of Contents:
“... Learning Resources Organization -- A Context-Based Framework and Method for Learning Object Description...”View full text
Electronic
eBook
19
Published 2005
Table of Contents:
“... by Exploiting Intelligent Context-Awareness -- A Behavior-Based Personal Controller for Autonomous Ubiquitous...”View full text
Electronic
eBook
20
Published 2007
Table of Contents:
“...UCS2007 -- RFID Privacy Using Spatially Distributed Shared Secrets -- Context Adapted Certificate...”View full text
Electronic
eBook



