Results 51 to 60 of about 1,577,136 (298)
Approaches to Interpreter Composition [PDF]
In this paper, we compose six different Python and Prolog VMs into 4 pairwise compositions: one using C interpreters; one running on the JVM; one using meta-tracing interpreters; and one using a C interpreter and a meta-tracing interpreter.
Barrett, Edd+2 more
core +3 more sources
What motivates enrolment in programming MOOCs?
Learners who enrol in massive open online courses (MOOCs) have different backgrounds and tend to have different motivations than learners in traditional courses.
P. Luik+6 more
semanticscholar +1 more source
The shape of a cable hanging under its own weight and uniform horizontal tension between two power poles is a catenary. The catenary is a curve which has an equation defined by a hyperbolic cosine function and a scaling factor.
Eric Costello
doaj +1 more source
Reflecting on an Existing Programming Language
Reflection has proven to be a valuable asset for programming languages, especially object-oriented ones, by promoting adaptability and extensibility of programs. With more and more applications exceeding the boundary of a single address space, reflection
A. Leitner+3 more
semanticscholar +1 more source
C# parser for extracting cryptographic protocols structure from source code
Cryptographic protocols are the core of any secure system. With the help of them, data is transmitted securely and protected from third parties' negative impact.
Ilya Aleksandrovich Pisarev+1 more
doaj +1 more source
Visual and Textual Programming Languages: A Systematic Review of the Literature [PDF]
It is well documented, and has been the topic of much research, that Computer Science courses tend to have higher than average drop out rates at third level. This is a problem that needs to be addressed with urgency but also caution.
Mooney, Aidan, Noone, Mark
core +3 more sources
The article describes methods for applying two-factor authentication (2FA). An example of two-factor authentication using mobile devices as identifiers and the generation of a temporary password based on the hash function of encryption standards is ...
О. А. Ussatova+2 more
doaj +1 more source
Lifted Variable Elimination for Probabilistic Logic Programming
Lifted inference has been proposed for various probabilistic logical frameworks in order to compute the probability of queries in a time that depends on the size of the domains of the random variables rather than the number of instances.
Bellodi, Elena+4 more
core +1 more source
This paper investigates the combined effects of radiant heat, local Nusselt number and Skin friction coefficient on a channel flow of third grade fluid in the presence of saturated porous medium.
B. A. Peter+3 more
doaj +1 more source
Enhancing Wind Energy Potential Assessment with Three-Parameter Weibull Distribution: A Comparative Analysis using MATLAB [PDF]
To determine the wind energy potential, the probability density function is typically used. For data distribution with modest wind speeds, this paper developed a three-parameter Weibull model.
K Kannakumar+6 more
doaj +1 more source