Method engineering

Results: 5218



#Item
131Software engineering / Computer programming / Computing / Object-oriented programming / Network socket / Cross-platform software / Method / Berkeley sockets / Inheritance / Virtual function / Winsock / Go

Easy Event Notification Using Multiple Inheritance: An Example Using WinSock By Chris Sells, 6/95 C++ is a much-maligned language. It continues to take potshots from all sides. Although I can’t help agreeing with some

Add to Reading List

Source URL: sellsbrothers.com

Language: English - Date: 2015-08-22 14:30:08
132Data analysis / Scientific method / Data / Structural analysis / Earthquake engineering / Science and technology / Science

Microsoft Word - Post_Event_Reports

Add to Reading List

Source URL: www.kmioss.com

Language: English - Date: 2016-08-04 11:38:27
133Software engineering / Computing / Computer programming / Subroutines / Data types / Concurrent programming languages / Object-oriented programming languages / C++ / Const / C++ classes / Java / Method

Reminder:  Lecture  slides ● Lecture   slides  are  posted   online   and  are  available   before   class

Add to Reading List

Source URL: cs.brown.edu

Language: English - Date: 2015-09-17 13:39:00
134Telecommunications engineering / Network performance / Network management / Probability theory / Operations research / Computing / Scientific modeling / Queueing theory / Discrete event simulation / Network simulation / Computer simulation / Traffic generation model

An efficient method for performance analysis of high speed networks : modeling and hardware emulation  Cyril Labb´e and Jean-Marc Vincent

Add to Reading List

Source URL: membres-lig.imag.fr

Language: English - Date: 2014-01-09 04:24:30
135Software engineering / Computer programming / Computing / Object-oriented programming / Common Lisp Object System / Metaobject / Generic function / Metaclass / Frame language / Class / Object / Mutator method

ACT Parameterization Framework Alan Paviˇci´c Nikˇsa Bosni´c AVL-AST Zagreb, Croatia

Add to Reading List

Source URL: www.deinprogramm.de

Language: English - Date: 2005-10-09 10:54:10
136Software engineering / Computing / Ada / Computer programming / GNAT / Jean Ichbiah / Robert Dewar / LIS / A Sharp / SPARK / Grady Booch / HOOD method

Microsoft PowerPoint - php16

Add to Reading List

Source URL: karl.nyberg.net

Language: English - Date: 2008-03-04 11:29:30
137Dynamical systems / Engineering / Product lifecycle management / Numerical analysis / Finite element method / Business / Computer-aided engineering / Multibody system / Multibody simulation / Simulation / Ansys / Virtual prototyping

Microsoft Word - Advanced Neurophysiology - DA CORREGGERE

Add to Reading List

Source URL: phd.dibris.unige.it

Language: English - Date: 2015-02-12 05:43:30
138Energy / Nuclear physics / Nuclear technology / United States Department of Energy national laboratories / Federally Funded Research and Development Centers / Energy conversion / Argonne National Laboratory / Lemont /  Illinois / Nuclear power / Nuclear reactor / Nuclear engineering / Nuclear proliferation

Enabling a Sustainable Nuclear Energy Future Today, nuclear energy is the largest non-carbon electricity production method in use, but the nation must effectively address economic and waste management concerns to enable

Add to Reading List

Source URL: www.ne.anl.gov

Language: English - Date: 2016-08-12 14:25:44
139Numerical linear algebra / Mathematics / Numerical analysis / Mathematical analysis / Density matrix renormalization group / Applied mathematics / Multigrid method / Tensor / Lanczos algorithm / Algorithm / Preconditioner / Matrix

Computational Science and Engineering (Int. Master’s Program) ¨ MUNCHEN ¨ TECHNISCHE UNIVERSITAT

Add to Reading List

Source URL: www5.in.tum.de

Language: English
140Misconduct / Spamming / Crime / Computing / Cybercrime / Social engineering / Identity theft / Phishing / Computer virus / Computer security / Email spam / Email

THE FACTS: PHISHING AND SPEARPHISHING What is “phishing?” Email attack is the preferred method for many hackers. Verizon’s 2013 Data Breach Investigations Report found that “more than 95% of all attacks tied to s

Add to Reading List

Source URL: www.arcyber.army.mil

Language: English - Date: 2016-03-15 15:31:42
UPDATE