Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for ''
published presentations and documents on DocSlides.
Finding Time Series Discords Based on Haar Transform A
by luanne-stotts
cuhkeduhk Department of Computer Science and Engin...
, IJARCSSE All Rights Reser
by sherrill-nordquist
TMRF e-Book Advanced Knowledge Based Systems: Model, Applications & Re
by giovanna-bartolotta
Department of Computer Science, North Maharashtra ...
Computer Science and Engineering
by faustina-dinatale
Diversified Spatial Keyword Search On Road Networ...
Chapter 13 Multimedia and Artificial Intelligence
by phoebe-click
Chapter 13. Multimedia and Artificial Intelligenc...
Overview of CBT /
by cheryl-pisano
Using PowerPoint Tools. Dr. Steve Broskoske. Mise...
Solutions for Enterprise Wide Procurement (SEWP
by olivia-moreira
). Agenda. Introductions. SEWP Overview. Website ...
Chapter 2: History of Video Games
by calandra-battersby
Magda El Zarki. Prof. of CS. Univ. of CA, Irvine....
AIRS Certification Program
by briana-ranney
Computer-Based Testing (CBT). AIRS Webinar: Octob...
A Stoppable clock based Approach for Low Power Network Interface Desig
by phoebe-click
IJCSI International Journal of Computer Science Is...
What is a
by myesha-ticknor
CAT?. Introduction. What is a CAT?. What is a CAT...
Test Administrator Interface
by cheryl-pisano
& Student Interface. Florida Standards Assess...
UN.CO.V.E.R. (UNiversal COmputer-based Visual Exploration of Risks) pr
by yoshiko-marsland
SWITCH-ON has received funding from the European U...
Computer-Based Message Services175
by phoebe-click
H.T. Smith (Editor) Elsevier Science Publlshers B....
Computing Research and Education
by jane-oiler
at The University of Pittsburgh. Physics. Econ. M...
The only intelligent planet?
by mitsue-stanley
Susan Cartwright. University of Sheffield. Are we...
Role-Based Access ControlsReprinted from 15th National Computer Secur
by conchita-marotz
[1] , [2] This is especially true of organizatio...
LOGICAL AGENTS
by min-jolicoeur
Tuğçe. ÜSTÜNER. Artificial. . Intelligence....
Integrating Digital Media and Educational Software Applicat
by test
Chapter 5. Chapter Objectives. Explain the differ...
Updating the CERN Computer Centre Infrastructure
by celsa-spraggs
Ian Bird, CERN. GDB, 21. st. March 2012. Outline...
Training the Enumerators and
by cheryl-pisano
Collection of Data Part I. Importance of Training...
BASED EXAMINATION
by mitsue-stanley
COMPUTER - FOR FOUNDATION PROGRAMME JUNE, 2015 TIM...
Computer Based War Gaming
by lois-ondreau
What did you set out to do? . How did you do it? ...
All About Computers
by pasty-toler
Majesti Corbett. Mrs.wotten. Homeroom. This is th...
Spieleentwicklung
by myesha-ticknor
– . Motivation Gratis ;). Dr. Mathias Lux. ITE...
ent of computer
by yoshiko-marsland
Developm - based training and learning managemen...
MOOCs in Health Professions Education:
by alida-meadow
Hype or Hope?. Catherine R Lucey MD. Professor of...
Chapter 1 - Introduction
by faustina-dinatale
Lecture 1. Way back when . . .. “The name ‘so...
Computer-based Training Disabling Pop-Up BlockersPop-ups are windows t
by olivia-moreira
Pop-up blockers are everywhere and they are often ...
Toward Brain-Computer Interfacing
by phoebe-click
Minhye Chang. Contents. 5. . The Berilin Brain-Co...
A computer-assisted constraint-based system for assembling
by giovanna-bartolotta
G. Palmas, N. Pietroni, . P. Cignoni. , R. Scopig...
Physically based deformable models in computer graphics
by conchita-marotz
Physicallybaseddeformablemodelshavebeenwidelyembra...
Generation of an Error Set that Emulates Software Faults- Based on Fie
by giovanna-bartolotta
J. Christmansson Department of Computer Engineerin...
Sorting
by giovanna-bartolotta
Out Media Players . For . Digital Signage. Presen...
ATEC 4371.001
by yoshiko-marsland
Procedural Animation. Introduction . to Procedura...
reading & understanding code
by calandra-battersby
experts are better at code comprehension because ...
Data and Computer Communications
by faustina-dinatale
Ninth . Edition. by William Stallings. Chapter 12...
CSE534 Fundamentals of Computer Networks
by cheryl-pisano
Lecture 14: P2P and BitTorrent. (I swear I only u...
Integrated Maximum Flow Algorithm for Optimal Response Time
by yoshiko-marsland
Nihat. . Altiparmak. , . Ali . Saman. . Tosun. ...
CSE534 – Fundamentals of Computer Networks
by tatyana-admore
Lecture 8-9: Transport. (UDP, but mostly TCP). Ba...
Load More...