Search Results - ((java programming) OR ((games OR james) programming))

Search alternatives:

Refine Results
  1. 1381
  2. 1382
  3. 1383

    An introduction to applied optimal control by Knowles, Greg

    Published 1981
    Table of Contents: “…Continuous Dynamic Programming-Differential Games; References; Chapter VII. …”
    Full text (MFA users only)
    Electronic eBook
  4. 1384

    Sex in consumer culture : the erotic content of media and marketing

    Published 2006
    Table of Contents: “…Peddling desire: sex and the marketing of media and consumer goods / Tom Reichert and Jacqueline Lambiase -- Using sex to sell movies: a content analysis of movie trailers / Mary Beth Oliver and Sriram Kalyanaraman -- Seduction, shock, and sales: research and functions of sex in music video / Julie Andsager -- Voluptuous vixens and macho males: a look at the portrayal of gender and sexuality in video games / Stacy L. Smith and Emily Moyer-Gusé -- Sex and the marketing of contemporary consumer magazines: how men's magazines sexualized their covers to compete with Maxim / Jacqueline Lambiase and Tom Reichert -- From sideline to centerfold: the sexual commodification of female sportscasters / Jamie Skerski -- Selling Spanish-Language programming: a comparison of sex and gender in Univision and NBC promotional announcements / Jami A. …”
    Full text (MFA users only)
    Electronic eBook
  5. 1385

    Handbook of big data technologies

    Published 2017
    Table of Contents: “…5.2 Examples6 Dataflow-Based; 6.1 Features; 6.2 Examples; 7 Bulk Synchronous Parallel; 7.1 Features; 7.2 Examples; 8 High Level DSL; 8.1 Pig Latin; 8.2 Crunch/FlumeJava; 8.3 Cascading; 8.4 Dryad LINQ; 8.5 Trident; 8.6 Green Marl; 8.7 Asterix Query Language (AQL); 8.8 IBM Jaql; 9 Discussion and Conclusion; References; Programming Platforms for Big Data Analysis; 1 Introduction; 2 Requirements of Big Data Programming Support; 3 Classification of Programming Platforms; 3.1 Data Source; 3.2 Processing Technique; 4 Major Existing Programming Platforms; 4.1 Data Parallel Programming Platforms.…”
    Full text (MFA users only)
    Electronic eBook
  6. 1386
  7. 1387

    Student transitions from middle to high school : improving achievement and creating a safer environment by Queen, J. Allen

    Published 2002
    Table of Contents: “…Removing the Bully Factor from Transitions9 Ninth-Grade Transitions and Improvements; Discipline and Transitions; Violence Prevention Programs; 10 Examining Exemplar Programs; 11 Developing and Effective Transitional Plan for the Local School System; 12 Games and Activities for Students; 13 Games and Activities for Teachers and Staff Development; Appendix A Queen's Twelve Factors for Successful Transitions; Appendix B Surveys, Tips, and Related Resources; References.…”
    Full text (MFA users only)
    Electronic eBook
  8. 1388

    Instant audio processing with web audio by Khoo, Chris

    Published 2013
    Full text (MFA users only)
    Electronic eBook
  9. 1389
  10. 1390

    Information Search After Static or Moving Targets : Theory and Modern Applications. by Ben-Gal, Irad

    Published 2013
    Table of Contents: “…3.1.2 Search with probabilistic and informational decision rules3.2 Partially observable MDP model and dynamic programming approach; 3.2.1 MDP with uncertain observations; 3.2.2 Simple Pollock model of search; 3.2.3 Ross model with single-point observations; 3.3 Models of moving target search with constrained paths; 3.3.1 Eagle model with finite and infinite horizons; 3.3.2 Branch-and-bound procedure of constrained search with single searcher; 3.3.3 Constrained path search with multiple searchers; 3.4 Game theory models of search; 3.4.1 Game theory model of search and screening.…”
    Full text (MFA users only)
    Electronic eBook
  11. 1391
  12. 1392

    Economic dynamics in discrete time by Miao, Jianjun, 1969-

    Published 2014
    Table of Contents: “…Intro; Contents; Preface; Acknowledgments; I Dynamical Systems; 1 Deterministic Difference Equations; 2 Stochastic Difference Equations; 3 Markov Processes; 4 Ergodic Theory and Stationary Processes; II Dynamic Optimization; 5 Markov Decision Process Model; 6 Finite-Horizon Dynamic Programming; 7 Infinite-Horizon Dynamic Programming; 8 Applications; 9 Linear-Quadratic Models; 10 Control under Partial Information; 11 Numerical Methods; 12 Structural Estimation; III Equilibrium Analysis; 13 Complete Markets Exchange Economies; 14 Neoclassical Growth Models…”
    Full text (MFA users only)
    Electronic eBook
  13. 1393
  14. 1394

    Backbase 4 RIA Development. by Emde Boas, Ghica van

    Published 2009
    Table of Contents: “…Verifying the installation of the Backbase framework"Hello World" using a Backbase balloon; The JavaScript balloon; The XEL balloon; Hello Server!…”
    Full text (MFA users only)
    Electronic eBook
  15. 1395

    Youth gangs and community intervention : research, practice, and evidence

    Published 2010
    Table of Contents: “…Tita, Andrew Papachristos -- Lessons learned from gang program evaluations: prevention, intervention, suppression, and comprehensive community approaches / James C. …”
    Full text (MFA users only)
    Electronic eBook
  16. 1396

    Modeling, computation and optimization

    Published 2009
    Table of Contents: “…1. Modeling a jamming game for wireless networks / Andrey Garnaev -- 2. …”
    Full text (MFA users only)
    Electronic eBook
  17. 1397

    Dependable software systems engineering

    Published 2016
    Table of Contents: “…Title Page; Preface; Contents; Probabilistic Model Checking; SMT Solvers: Foundations and Applications; Formal Models for Analyzing Security Protocols: Some Lecture Notes; Parameterized Verification of Crowds of Anonymous Processes; Synthesis of Reactive Systems; Between Testing and Verification: Dynamic Software Model Checking; Learning-Based Compositional Model Checking of Behavioral UML Systems; Programming by Examples (and Its Applications in Data Wrangling); Verification of Concurrent Software; A Tutorial on Mean-Payoff and Energy Games; Equivalence -- Combinatorics, Algebra, Proofs.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  18. 1398

    Computational Intelligence, Evolutionary Computing, Evolutionary Clustering Algorithms. by Kristensen, Terje

    Published 2016
    Table of Contents: “…TOOLS AND TECHNOLOGIES; 5.3.1. Java; 5.3.2. JavaFX; 5.3.3. Netbeans; 5.3.4. Maven.…”
    Full text (MFA users only)
    Electronic eBook
  19. 1399

    MODELING AND SIMULATION OF LOGISTICS FLOWS : dashboards, traffic planning and management. by REVEILLAC, JEAN-MICHEL

    Published 2017
    Table of Contents: “…Minimum-cost transport; 1.6. Linear programming.…”
    Full text (MFA users only)
    Electronic eBook
  20. 1400

    Advances in Network and Distributed Systems Security : IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26-27, 2001, Leuven, Belgium by Decker, Bart

    Published 2002
    Table of Contents: “…CONTENTS -- PREFACE -- ACKNOWLEDGEMENTS -- PART ONE Reviewed Papers -- A ROLE- BASED SPECIFICATION OF THE SET PAYMENT TRANSACTION PROTOCOL -- INFORMATION SECURITY: MUTUAL AUTHENTICATION IN E- COMMERCE -- SOFTWARE- BASED RECEIPT- FREENESS IN ON- LINE ELECTIONS -- ID-BASED STRUCTURED MULTISIGNATURE SCHEMES -- PROBABILISTIC RELATIONS FOR THE SOLITAIRE KEYSTREAM GENERATOR -- HAZARD ANALYSIS FOR SECURITY PROTOCOL REQUIREMENTS -- SECURING RMI COMMUNICATION -- SECURE JAVA DEVELOPMENT WITH UML -- SECURITY THROUGH ASPECT- ORIENTED PROGRAMMING…”
    Full text (MFA users only)
    Electronic eBook