1
by Lysne, Olav.
Published 2018
Format:
Table of Contents: ... in Vendors Is Different from Computer Security -- 1.7 Why the Problem Is Important -- 1.8 Advice for Readers...
Click to View
2
by World Bank
Published 2014
Subjects: ...APPLICATION SOFTWARE...
Get full text
Get full text
3
4
by World Bank
Published 2015
Subjects: ...APPLICATION PROGRAMMING...
Get full text
Get full text
5
6
7
by Gregory, Peggy.
Published 2021
Format:
Table of Contents: ....1 Implementing Ethics into Software Development -- 2.2 ECCOLA Method and It's Application -- 2.3 User Stories...
Click to View
8
9
by Youngman, Richard
Published 2013
Subjects: ...APPLICATION OF INFORMATION...
Get full text
Get full text
10
11
12
by Glewwe, Paul.
Published 2021
Format:
Table of Contents: ... the program and the outcomes of interest -- Step 2. Forming a theory of change to refine the evaluation...
Click to View
13
by McGrath, Michael J.
Published 2013
Format:
Table of Contents: ... of Sensors -- Drivers for Sensor Applications -- Health and Fitness -- Aging Demographics -- Personalized...
Click to View
14
15
by Nebel, Mathias.
Published 2022
Format:
Table of Contents: ...Intro -- Contents -- Acknowledgements -- Introduction -- 1. The Research Question -- 2. Why Do We...
Click to View
16
by Kuriakose, Smita
Published 2013
Subjects: ...BUSINESS DEVELOPMENT...
Get full text
Get full text
17
by Gatzweiler, Franz W.
Published 2016
Format:
Table of Contents: ... for Marginalized Smallholder Farmers and Development: An Overview and Implications for Policy and Resear...
Click to View
18
by Lambers, Leen.
Published 2023
Format:
Table of Contents: ... Foundation of Program Comprehension (Abstract of an Invited Talk) -- Contents -- Regular Contributions -- ACo...
Click to View
19
by Holzinger, Andreas.
Published 2022
Format:
Table of Contents: ...-Intelligibility of High-Dimensional IML Output -- 9.2 Computational Effort....
Click to View
20
by Gruhn, Volker.
Published 2018
Format:
Table of Contents: ... for Deviceless Edge Computing -- 4.1 Programming Support for Deviceless Edge Functions -- 4.2 Intents and Intent...
Click to View