1
2
3
4
5
6
7
8
by Reinders, James.
Published 2020
Format:
Table of Contents: ... -- Application Error Handling Strategy -- Ignoring Error Handling -- Synchronous Error Handling -- Asynchronous...
Click to View
9
10
by McGrath, Michael J.
Published 2013
Format:
Table of Contents: ... -- Home Deployment Elements -- Home- and Community-Based Sensing -- Body-Worn Assessment Applications...
Click to View
11
by Glewwe, Paul.
Published 2021
Format:
Table of Contents: ... -- Introduction -- Using randomized controlled trials to evaluate program impacts -- Impact evaluations based...
Click to View
12
by Loucks, Daniel P.
Published 2017
Format:
Table of Contents: ....5.3 Integrated Water Resources Management -- 1.5.4 Water Security and the Sustainable Development Goals (SDGs...
Click to View
13
by Gruhn, Volker.
Published 2018
Format:
Table of Contents: ... -- Contracts in Architectures -- References -- Formal Methods and Agile Development: Towards a Happy Marriage...
Click to View
14
by Wang, Shawn X.
Published 2018
Format:
Table of Contents: ... Manufacturing, Data Integration and Transmission -- A DCT-domain-based Research and Application of the Algorithm...
Click to View
15
by Kohl, Holger.
Published 2023
Format:
Table of Contents: ... for Smartphones with Material-Based GHG Emissions and Costs Using Linear Physical Programming -- 1 Introduction...
Click to View
16
by Onoda, Masami.
Published 2017
Format:
Table of Contents: ... Imaging Program -- 3.1.4 Decadal Survey for Earth Science and Applications from Space -- 3.2 Quantifying...
Click to View
17
by Altman, Russ B.
Published 2009
Format:
Table of Contents: ... ALGORITHM FOR ESTIMATION OF THE MAXIMUM LIKELIHOOD ANCESTRAL RECONSTRUCTION ERROR -- OPTIMIZATION METHODS...
Click to View
18
by Leape, Lucian L.
Published 2021
Format:
Table of Contents: ...: It's Not Bad People: Error in Medicine -- The Causes of Errors -- Application of Systems Thinking to Healthcare...
Click to View
19
by Cheruvu, Sunil.
Published 2019
Format:
Table of Contents: ... Privilege Levels and System Authorization -- Zephyr Programming Error Protections -- Zephyr's Other Security...
Click to View
20
by Marrs, Adam.
Published 2021
Format:
Table of Contents: ... -- 5.2.5 DEPTH DERIVATIVES -- 5.2.6 PUTTING IT ALL TOGETHER -- 5.3 FURTHER APPLICATIONS -- 5...
Click to View