1
2
by Cohen, Ryan.
Published 2014
Format:
Table of Contents: ... Application Development -- Development Environment of Android Applications -- Cross-Development -- Programming...
Click to View
3
4
5
6
by Wang, Shawn X.
Published 2018
Format:
Table of Contents: ... -- Macro Program Application on Non-circular Curve Machining in CNC Lathe -- Singular Configuration...
Click to View
7
by Loucks, Daniel P.
Published 2017
Format:
Table of Contents: ....5.3 Integrated Water Resources Management -- 1.5.4 Water Security and the Sustainable Development Goals (SDGs...
Click to View
8
by Reinders, James.
Published 2020
Format:
Table of Contents: ... -- Book GitHub -- Hello, World! and a SYCL Program Dissection -- Queues and Actions -- It Is All About...
Click to View
9
by Jonoska, Natasa.
Published 2023
Format:
Table of Contents: ....1 Logic Programming Framework -- 2.2 Related Work -- 3 Future -- 3.1 Computational Tool Integration -- 3...
Click to View
10
by Cochez, Michael.
Published 2021
Format:
Table of Contents: ... Definition of CPP -- 4.3 Dynamic Programming Algorithm -- 4.4 Computational Complexity of Dynamic Programming...
Click to View
11
by Domingue, John.
Published 2011
Format:
Table of Contents: ... -- Research Focus on Developing Secure FI Services -- Security Requirements Engineering -- Secure Service...
Click to View
12
by Della Torre, Stefano.
Published 2019
Format:
Table of Contents: ...5 Conclusions -- References -- Origins and Development of the American Campus: The "Academical...
Click to View
13
by Krajci, Iggy.
Published 2013
Format:
Table of Contents: ... -- Licensing -- Android Licensing Cost -- Application Licensing Cost -- Physical Development Costs -- Software...
Click to View
14
by Ramon, Manoel.
Published 2014
Format:
Table of Contents: ... the Linux Console -- Testing the Data Cables -- Summary -- Chapter 2: Native Development -- Introduction...
Click to View
15
by Reussner, Ralf.
Published 2019
Format:
Table of Contents: ... Model Information with Program Code -- 9.3.2 Application: Security Evolution Scenario -- 9.3.3 Security...
Click to View
16
by Felderer, Michael.
Published 2022
Format:
Table of Contents: ... Contribution -- 5 Honestly Discuss Limitations -- 6 Show Usefulness and Practical Applicability -- 7 Have a...
Click to View
17
by Nayak, Umesha.
Published 2014
Format:
Table of Contents: ... Program -- Chapter 2: History of Computer Security -- Introduction -- Communication -- World Wars...
Click to View
18
by Cacek, Jan.
Published 2020
Format:
Table of Contents: ... Skotáková, Petr Hedbávný, Kateřina Kolářová -- The application of fuzzy logic in the diagnostics...
Click to View
19
by Gettelman, Andrew.
Published 2016
Format:
Table of Contents: ....5.1 The Computer Program -- 4.5.2 Running a Model -- 4.6 Summary -- Part II Model Mechanics -- 5 Simulating...
Click to View
20
by Schüppstuhl, Thorsten.
Published 2023
Format:
Table of Contents: ...-Assisted Robot Programming -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Concept -- 4 Implementation...
Click to View