Results 81 to 90 of about 109,966 (284)

Formal Semantics for the Java Modeling Language

open access: yes, 2009
Diese Arbeit beschäftigt sich mit der Semantik der Java Modeling Language (JML). JML is eine weitverbreitete Spezifikationssprache, die speziell auf Java zugeschnitten ist und sowohl zur statischen als auch zur Laufzeitanalyse von Programmen verwandt wird.
openaire   +3 more sources

Parental involvement and engagement during COVID‐19 lockdowns: School staff and parents' reflections about children's learning at home

open access: yesBritish Educational Research Journal, EarlyView.
Abstract Valuing parental engagement, as part of home–school collaboration, can benefit children's learning. This article focuses on parents and school‐based staff's (N = 120) experiences of children's learning occurring at home during the COVID‐19 lockdowns (2020–2021), both school‐mandated and other learning activities.
Ashley Brett   +5 more
wiley   +1 more source

Desarrollo de un servicio web de verificación vehicular en centrales de riesgos crediticios

open access: yesIndustrial Data, 2011
Las centrales de riesgo crediticio en el Perú son empresas receptoras de información de fuentes externas (AFP, bancos, seguros, municipalidades, etc.) que se encargan de brindar diversos servicios a las empresas, entidades y ciudadanos del país, por ende
Félix Melchor Santos López
doaj   +1 more source

The Need to Support of Data Flow Graph Visualization of Forensic Lucid Programs, Forensic Evidence, and their Evaluation by GIPSY

open access: yes, 2011
Lucid programs are data-flow programs and can be visually represented as data flow graphs (DFGs) and composed visually. Forensic Lucid, a Lucid dialect, is a language to specify and reason about cyberforensic cases.
Debbabi, Mourad   +2 more
core   +1 more source

Bridging the Gap: Student Voices on Recruitment and Retention in Ecology

open access: yesThe Bulletin of the Ecological Society of America, EarlyView.
Abstract Students entering ecology and environmental science face a variety of challenges, including limited awareness of career paths, lack of mentorship, and difficulties connecting with peers and faculty. These challenges are often amplified for students from marginalized backgrounds, who may also encounter microaggressions, underrepresentation, and
Alexis Ellis   +9 more
wiley   +1 more source

Android Application for Tasikmalaya City Tourism Guidance

open access: yesJurnal Teknologi dan Sistem Komputer, 2017
Tourism is a valuable aspect of a region. The presence of the tourist areas will promote the welfare of the surrounding community. Information about the location of the tourist attractions in Tasikmalaya is still lacking and this is an obstacle for the ...
Danial Ahmad Muslih   +2 more
doaj   +1 more source

Parallelization Strategies for Spatial Agent-Based Models

open access: yes, 2016
Agent-based modeling (ABM) is a bottom-up modeling approach, where each entity of the system being modeled is uniquely represented as an independent decision-making agent. Large scale emergent behavior in ABMs is population sensitive. As such, the number
Fachada, Nuno   +3 more
core   +1 more source

Barriers and Enablers of Circular Economy in Electrical and Electronic Equipment: A Systematic Literature Review

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT Rapid technological change, shorter lifecycles and rising demand for electrical and electronic equipment (EEE) are increasing waste electrical and electronic equipment (WEEE) and emphasise the need for a circular economy. This paper identifies barriers and enablers of the circular transition in EEE and outlines interventions.
Aya Abdelmeguid, Lucia Corsini
wiley   +1 more source

Adaptive secure malware efficient machine learning algorithm for healthcare data

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed   +8 more
wiley   +1 more source

Pengenalan Rumah Adat di Pulau Jawa Sebagai Media Pembelajaran Berbasis VRML

open access: yesJurnal Teknologi dan Sistem Komputer, 2015
Indonesia is rich in culture, ethnicity which one example is the traditional houses that exist in each province. Introduce Indonesian traditional house to users by using information technology as a medium of information could be one way to preserve the ...
Ari Fitriyanto   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy