The Computer Journal

Results: 890



#Item
101

Journal of Combinatorial Theory, Series B 86, 27–doi:jctbAsymptotically the List Colouring Constants Are1 Bruce Reed CNRS, Paris, France; and School of Computer Science, McGill University,

Add to Reading List

Source URL: cgm.cs.mcgill.ca

Language: English - Date: 2003-09-12 13:36:00
    102

    Journal of Universal Computer Science, vol. 19, no), submitted: , accepted: , appeared: 1/3/13 © J.UCS The Role of the iPad in the Hands of the Learner Amandeep Dhir (Department of Comput

    Add to Reading List

    Source URL: jucs.org

    Language: English - Date: 2014-09-01 04:43:48
      103

      International Journal of Computer Science in Sport – VolumeEdition 1 www.iacss.org Empowering the Exercise: a Body-Controlled Trampoline Training Game

      Add to Reading List

      Source URL: mediatech.aalto.fi

      Language: English - Date: 2014-08-21 05:30:07
        104

        International Journal of Computer Vision 53(2), 169–191, 2003 c 2003 Kluwer Academic Publishers. Manufactured in The Netherlands.  Contextual Priming for Object Detection ANTONIO TORRALBA

        Add to Reading List

        Source URL: people.csail.mit.edu

        Language: English - Date: 2003-05-15 17:05:20
          105

          Chicago Journal of Theoretical Computer Science The MIT Press Volume 1999, Article 11 Satisfiability Coding Lemma ISSN 1073–0486. MIT Press Journals, Five Cambridge Center, Cambridge,

          Add to Reading List

          Source URL: cseweb.ucsd.edu

          Language: English - Date: 2013-10-01 17:54:25
            106Computing / Software / Digital media / Email / Social networking services / Webmail / Spamming / Social information processing / Renren / Sybil attack / Sybil / Gmail

            Jiang J, Shan ZF, Wang X et al . JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY : 1– Mon. Year Understanding Sybil Groups in the Wild Jing Jiang1,2 (蒋 竞), Member, CCF, Zifei Shan2 (单子非), Xiao Wang2 (王 潇) Li Z

            Add to Reading List

            Source URL: www.zifeishan.org

            Language: English - Date: 2014-12-18 18:37:50
            107

            Journal of Computer and System Sciences 62, 367doi:jcss, available online at http:www.idealibrary.com on On the Complexity of k-SAT Russell Impagliazzo 1 and Ramamohan Paturi 2 University

            Add to Reading List

            Source URL: cseweb.ucsd.edu

            Language: English - Date: 2013-10-01 17:28:20
              108

              International Journal of Information Science and Computer Application (IJISCA) Vol), ppFormal Hash Compression Provenance Techniques for the Preservation of the Virtual Machine Log Auditor Environment Sean

              Add to Reading List

              Source URL: www.proficiencylabs.com

              Language: English - Date: 2013-04-16 18:45:13
                109

                Published in Journal of Computer Security 5(3):213–223, AUTHENTICATION OF SEQUENCES WITH THE SL2 HASH FUNCTION: APPLICATION TO VIDEO SEQUENCES Jean-Jacques Quisquater

                Add to Reading List

                Source URL: joye.site88.net

                Language: English - Date: 2015-09-04 19:44:14
                  110

                  Tablet use in schools: A critical review of the evidence for learning outcomes Haßler, B., Major, L. & Hennessy, S. June 2015 Accepted for publication in: Journal of Computer Assisted Learning http://wileyonlinelibrary.

                  Add to Reading List

                  Source URL: larrycuban.files.wordpress.com

                  Language: English - Date: 2015-08-10 18:04:29
                    UPDATE