Results 51 to 60 of about 1,577,136 (298)

Approaches to Interpreter Composition [PDF]

open access: yes, 2015
In this paper, we compose six different Python and Prolog VMs into 4 pairwise compositions: one using C interpreters; one running on the JVM; one using meta-tracing interpreters; and one using a C interpreter and a meta-tracing interpreter.
Barrett, Edd   +2 more
core   +3 more sources

What motivates enrolment in programming MOOCs?

open access: yesBritish Journal of Educational Technology, 2019
Learners who enrol in massive open online courses (MOOCs) have different backgrounds and tend to have different motivations than learners in traditional courses.
P. Luik   +6 more
semanticscholar   +1 more source

Length of a Hanging Cable

open access: yesUndergraduate Journal of Mathematical Modeling: One + Two, 2011
The shape of a cable hanging under its own weight and uniform horizontal tension between two power poles is a catenary. The catenary is a curve which has an equation defined by a hyperbolic cosine function and a scaling factor.
Eric Costello
doaj   +1 more source

Reflecting on an Existing Programming Language

open access: yesJournal of Object Technology, 2007
Reflection has proven to be a valuable asset for programming languages, especially object-oriented ones, by promoting adaptability and extensibility of programs. With more and more applications exceeding the boundary of a single address space, reflection
A. Leitner   +3 more
semanticscholar   +1 more source

C# parser for extracting cryptographic protocols structure from source code

open access: yesТруды Института системного программирования РАН, 2019
Cryptographic protocols are the core of any secure system. With the help of them, data is transmitted securely and protected from third parties' negative impact.
Ilya Aleksandrovich Pisarev   +1 more
doaj   +1 more source

Visual and Textual Programming Languages: A Systematic Review of the Literature [PDF]

open access: yes, 2017
It is well documented, and has been the topic of much research, that Computer Science courses tend to have higher than average drop out rates at third level. This is a problem that needs to be addressed with urgency but also caution.
Mooney, Aidan, Noone, Mark
core   +3 more sources

Software implementation of 2 FA Software implementation of two-factor authentication to ensure security when accessing an information system

open access: yesВестник КазНУ. Серия математика, механика, информатика, 2019
The article describes methods for applying two-factor authentication (2FA). An example of two-factor authentication using mobile devices as identifiers and the generation of a temporary password based on the hash function of encryption standards is ...
О. А. Ussatova   +2 more
doaj   +1 more source

Lifted Variable Elimination for Probabilistic Logic Programming

open access: yes, 2014
Lifted inference has been proposed for various probabilistic logical frameworks in order to compute the probability of queries in a time that depends on the size of the domains of the random variables rather than the number of instances.
Bellodi, Elena   +4 more
core   +1 more source

Combined Effect of Radiant Heat, Local Nusselt Number and Skin Friction Coefficient of a Third Grade Fluid through a Channel Flow in a Saturated Porous Medium

open access: yesJournal of Applied Sciences and Environmental Management, 2022
This paper investigates the combined effects of radiant heat, local Nusselt number and Skin friction coefficient on a channel flow of third grade fluid in the presence of saturated porous medium.
B. A. Peter   +3 more
doaj   +1 more source

Enhancing Wind Energy Potential Assessment with Three-Parameter Weibull Distribution: A Comparative Analysis using MATLAB [PDF]

open access: yesE3S Web of Conferences
To determine the wind energy potential, the probability density function is typically used. For data distribution with modest wind speeds, this paper developed a three-parameter Weibull model.
K Kannakumar   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy