The Computer Journal

Results: 890



#Item
61Elementary arithmetic / Binary operations / Computer arithmetic / Mathematical notation / Mathematics education / Subtraction / Arithmetic / Division algorithm / Multiplication algorithm / Multiplication / Carry / Addition

NCSM JOURNAL • FALL/WINTERStandard Algorithms in the Common Core State Standards Karen C. Fuson, Northwestern University Sybilla Beckmann, University of Georgia

Add to Reading List

Source URL: www.mathedleadership.org

Language: English - Date: 2013-05-16 03:43:20
62Waste law / Waste management / Electronic waste / Computer recycling / Waste / Recycling / Global waste trade / Toxic waste / Incineration / Reuse / Zero waste / Electronic waste by country

Research in Business and Economics Journal Volume 11 E-Waste Management to Eliminate Environmental Pollution for the Greater Good

Add to Reading List

Source URL: www.aabri.com

Language: English - Date: 2016-05-25 12:48:30
63Computer security / Vulnerability / Information security / Application security / Threat model / Software development / Software / Threat / Draft:ICT Security Policy System: A Case Study / Mobile security

ISSA ISSA Journal | November 2009 The Global Voice of Information Security

Add to Reading List

Source URL: www.denimgroup.com

Language: English - Date: 2014-01-13 18:22:32
64Dynamical system / Systems / Systems theory / Topology / Regression analysis

International Journal of Computer Vision 51(2), 91–109, 2003 c 2003 Kluwer Academic Publishers. Manufactured in The Netherlands.  Dynamic Textures GIANFRANCO DORETTO

Add to Reading List

Source URL: www.stat.ucla.edu

Language: English - Date: 2003-04-03 14:42:44
65Art genres / Computer art / Conceptual art / Digital art / New media / Ernest Edmonds / Edmonds / Interactive art / Generative art

ERNEST EDMONDS Publications Editor-in-Chief of Transactions in the journal Leonardo General Editor of the Springer book series Cultural Computing. Member of the editorial board of the journal Digital Creativity

Add to Reading List

Source URL: research.it.uts.edu.au

Language: English - Date: 2014-11-07 07:15:03
66Computer cluster / Concurrent computing / Parallel computing / Cluster chemistry / Scan statistic / Disease cluster / Cosmic distance ladder / Determining the number of clusters in a data set / Cluster analysis

International Journal of Health Geographics BioMed Central Open Access

Add to Reading List

Source URL: www.geovista.psu.edu

Language: English - Date: 2016-07-01 14:44:21
67Accounting / E-commerce / Computer file formats / XBRL GL / XBRL / Standards organizations / Financial accounting / Resources /  events /  agents / XLink / Taxonomy / Financial statement / Draft:IRIS Business Services

The International Journal of Digital Accounting Research Vol. 9, 2009, ppISSN: REA and XBRL GL: Synergies for the 21st Century Business Reporting System

Add to Reading List

Source URL: www.uhu.es

Language: English - Date: 2009-12-14 12:56:52
68

ACIS International Journal of Computer & Information Science A Publication of the International Association for Computer & Information Science June 2012

Add to Reading List

Source URL: www.acisinternational.org

Language: English - Date: 2013-02-12 13:08:23
    69Web accessibility / Academic publishing / Open access / Usability / Web design / Open Journal Systems / Accessibility / Web Accessibility Initiative / Section 508 Amendment to the Rehabilitation Act / Fembot Collective / Computer accessibility

      Open Access & Accessibility Resources Compiled by Taylor Kirch, University of Illinois, Urbana-Champaign For FemTechNet | December 2013

    Add to Reading List

    Source URL: femtechnet.org

    Language: English - Date: 2014-10-11 14:03:19
    70Security / Prevention / Computing / Crime prevention / Cryptography / Information governance / National security / Information security / Computer security / Usability / Vulnerability / Paul Dourish

    International Journal of Human Computer Studies Special Issue on HCI Research in Privacy and Security, 63(1-2), In the Eye of the Beholder: A Visualization-based Approach to Information System Security Rogér

    Add to Reading List

    Source URL: www.dourish.com

    Language: English - Date: 2008-06-14 12:49:25
    UPDATE