DIKUL - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UL. Za polni dostop se PRIJAVITE.

2 3 4 5 6
zadetkov: 67.306
31.
  • The Constitution of Algorithms The Constitution of Algorithms
    Jaton, Florian 2021
    eBook
    Odprti dostop

    A laboratory study that investigates how algorithms come into existence. Algorithms—often associated with the terms big data, machine learning, or artificial intelligence—underlie the technologies we ...
Celotno besedilo
Dostopno za: UL

PDF
32.
  • Herramienta para la Enseñan... Herramienta para la Enseñanza de la Programación usando Elementos Gráficos /Tool for Teaching Programming Using Graphic Elements
    Picie-Alcaraz, Iván; Olivares-Zepahua, Beatriz Alejandra; López-Martínez, Ignacio ... RISTI : Revista Ibérica de Sistemas e Tecnologias de Informação, 03/2021 41
    Journal Article
    Recenzirano

    El aprendizaje de la programación es difícil y requiere un arduo trabajo por parte de los estudiantes. Necesitan hacer muchos ejercicios y crear muchos programas para mejorar sus competencias en ...
Celotno besedilo
Dostopno za: UL

PDF
33.
  • Fog Computing: Helping the ... Fog Computing: Helping the Internet of Things Realize Its Potential
    Dastjerdi, Amir Vahid; Buyya, Rajkumar Computer (Long Beach, Calif.), 2016-Aug., 2016-8-00, 20160801, Letnik: 49, Številka: 8
    Journal Article
    Recenzirano

    The Internet of Things (IoT) could enable innovations that enhance the quality of life, but it generates unprecedented amounts of data that are difficult for traditional systems, the cloud, and even ...
Celotno besedilo
Dostopno za: UL
34.
  • Mastering Apex Programming Mastering Apex Programming
    Battisson, Paul; Wheeler, Mike 2020
    eBook

    If you're a Salesforce developer, Mastering Apex Programming will help you to get to grips with the Apex language, its advanced features, and best practices for building robust cloud-based ...
Celotno besedilo
Dostopno za: UL
35.
Celotno besedilo

PDF
36.
  • Motivation to Learning Comp... Motivation to Learning Computer Programing Using a Game Application
    Keandoungchun, Nantapong; Angskun, Jitimon; Angskun, Thara International journal of information and education technology, 11/2023, Letnik: 13, Številka: 11
    Journal Article
    Odprti dostop

    Computer programming is a course studied in almost all fields; nevertheless, the survey found that many students obtain low grades or withdraw from the computer programming course because the ...
Celotno besedilo
Dostopno za: UL
37.
  • Can computational thinking ... Can computational thinking be improved by using a methodology based on metaphors and scratch to teach computer programming to children?
    Pérez-Marín, Diana; Hijón-Neira, Raquel; Bacelo, Adrián ... Computers in human behavior, April 2020, 2020-04-00, 20200401, Letnik: 105
    Journal Article
    Recenzirano

    Computational thinking (CT) is a key skill in the 21st century. However, it is not clear which is the most effective way to acquire and improve CT. Big research efforts are made to determine which ...
Celotno besedilo
Dostopno za: UL
38.
  • Getting Started for Interne... Getting Started for Internet of Things with Launch Pad and ESP8266
    Rajesh Singh, Anita Gehlot, Lovi Raj Gupta, Bhupendra Singh, Priyanka Tyagi 2019, 2022-09-01, 2018-03-01
    eBook

    Getting Started for Internet of Things with Launch Pad and ESP8266 provides a platform to get started with the Ti launch pad and IoT modules for Internet of Things applications. The book provides the ...
Celotno besedilo
Dostopno za: UL
39.
  • Game Theory Survey: Voting ... Game Theory Survey: Voting Methods of Preferential Ballot
    Wang, Yujie Journal of physics. Conference series, 12/2022, Letnik: 2386, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Abstract This paper is a survey focuses on seven basic Voting Methods for Preferential Ballots. The purpose is to give a pellucid illustration of these Methods in consideration of Game Theory, and ...
Celotno besedilo
Dostopno za: UL
40.
  • Efficient Secure Two-Party ... Efficient Secure Two-Party Protocols
    Hazay, Carmit 2010, 2010-09-15
    eBook
    Odprti dostop

    The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation. They study both general constructions that can be used to securely compute any ...
Celotno besedilo
Dostopno za: UL
2 3 4 5 6
zadetkov: 67.306

Nalaganje filtrov