Search Results - ((java programming) OR ((games OR james) programming))
Suggested Topics within your search.
Suggested Topics within your search.
- Development 178
- Application software 163
- Programming 139
- History 131
- Java (Computer program language) 128
- Video games 116
- JavaScript (Computer program language) 109
- Design 95
- Web site development 89
- Computer programs 78
- Social aspects 65
- Study and teaching 62
- Web sites 60
- Research 52
- Data processing 49
- Management 49
- History and criticism 47
- Education 44
- Internet programming 43
- Computer programming 42
- Activity programs 41
- Politics and government 35
- computer programming 34
- Computer software 33
- School improvement programs 32
- methods 32
- Computer graphics 31
- Government policy 31
- Web applications 31
- Social conditions 29
Search alternatives:
- java programming »
-
1381
-
1382
-
1383
An introduction to applied optimal control
Published 1981Table of Contents: “…Continuous Dynamic Programming-Differential Games; References; Chapter VII. …”
Full text (MFA users only)
Electronic eBook -
1384
Sex in consumer culture : the erotic content of media and marketing
Published 2006Table of Contents: “…Peddling desire: sex and the marketing of media and consumer goods / Tom Reichert and Jacqueline Lambiase -- Using sex to sell movies: a content analysis of movie trailers / Mary Beth Oliver and Sriram Kalyanaraman -- Seduction, shock, and sales: research and functions of sex in music video / Julie Andsager -- Voluptuous vixens and macho males: a look at the portrayal of gender and sexuality in video games / Stacy L. Smith and Emily Moyer-Gusé -- Sex and the marketing of contemporary consumer magazines: how men's magazines sexualized their covers to compete with Maxim / Jacqueline Lambiase and Tom Reichert -- From sideline to centerfold: the sexual commodification of female sportscasters / Jamie Skerski -- Selling Spanish-Language programming: a comparison of sex and gender in Univision and NBC promotional announcements / Jami A. …”
Full text (MFA users only)
Electronic eBook -
1385
Handbook of big data technologies
Published 2017Table of Contents: “…5.2 Examples6 Dataflow-Based; 6.1 Features; 6.2 Examples; 7 Bulk Synchronous Parallel; 7.1 Features; 7.2 Examples; 8 High Level DSL; 8.1 Pig Latin; 8.2 Crunch/FlumeJava; 8.3 Cascading; 8.4 Dryad LINQ; 8.5 Trident; 8.6 Green Marl; 8.7 Asterix Query Language (AQL); 8.8 IBM Jaql; 9 Discussion and Conclusion; References; Programming Platforms for Big Data Analysis; 1 Introduction; 2 Requirements of Big Data Programming Support; 3 Classification of Programming Platforms; 3.1 Data Source; 3.2 Processing Technique; 4 Major Existing Programming Platforms; 4.1 Data Parallel Programming Platforms.…”
Full text (MFA users only)
Electronic eBook -
1386
Implementing Web applications with CM Information Integrator for Content and ODWEK
Published 2004Full text (MFA users only)
Electronic eBook -
1387
Student transitions from middle to high school : improving achievement and creating a safer environment
Published 2002Table of Contents: “…Removing the Bully Factor from Transitions9 Ninth-Grade Transitions and Improvements; Discipline and Transitions; Violence Prevention Programs; 10 Examining Exemplar Programs; 11 Developing and Effective Transitional Plan for the Local School System; 12 Games and Activities for Students; 13 Games and Activities for Teachers and Staff Development; Appendix A Queen's Twelve Factors for Successful Transitions; Appendix B Surveys, Tips, and Related Resources; References.…”
Full text (MFA users only)
Electronic eBook -
1388
-
1389
Building Data Streaming Applications with Apache Kafka.
Published 2017Full text (MFA users only)
Electronic eBook -
1390
Information Search After Static or Moving Targets : Theory and Modern Applications.
Published 2013Table of Contents: “…3.1.2 Search with probabilistic and informational decision rules3.2 Partially observable MDP model and dynamic programming approach; 3.2.1 MDP with uncertain observations; 3.2.2 Simple Pollock model of search; 3.2.3 Ross model with single-point observations; 3.3 Models of moving target search with constrained paths; 3.3.1 Eagle model with finite and infinite horizons; 3.3.2 Branch-and-bound procedure of constrained search with single searcher; 3.3.3 Constrained path search with multiple searchers; 3.4 Game theory models of search; 3.4.1 Game theory model of search and screening.…”
Full text (MFA users only)
Electronic eBook -
1391
From airline reservations to Sonic the Hedgehog : a history of the software industry
Published 2003Full text (MFA users only)
Electronic eBook -
1392
Economic dynamics in discrete time
Published 2014Table of Contents: “…Intro; Contents; Preface; Acknowledgments; I Dynamical Systems; 1 Deterministic Difference Equations; 2 Stochastic Difference Equations; 3 Markov Processes; 4 Ergodic Theory and Stationary Processes; II Dynamic Optimization; 5 Markov Decision Process Model; 6 Finite-Horizon Dynamic Programming; 7 Infinite-Horizon Dynamic Programming; 8 Applications; 9 Linear-Quadratic Models; 10 Control under Partial Information; 11 Numerical Methods; 12 Structural Estimation; III Equilibrium Analysis; 13 Complete Markets Exchange Economies; 14 Neoclassical Growth Models…”
Full text (MFA users only)
Electronic eBook -
1393
Quantitative methods : an introduction for business management
Published 2011Full text (MFA users only)
Electronic eBook -
1394
Backbase 4 RIA Development.
Published 2009Table of Contents: “…Verifying the installation of the Backbase framework"Hello World" using a Backbase balloon; The JavaScript balloon; The XEL balloon; Hello Server!…”
Full text (MFA users only)
Electronic eBook -
1395
Youth gangs and community intervention : research, practice, and evidence
Published 2010Table of Contents: “…Tita, Andrew Papachristos -- Lessons learned from gang program evaluations: prevention, intervention, suppression, and comprehensive community approaches / James C. …”
Full text (MFA users only)
Electronic eBook -
1396
Modeling, computation and optimization
Published 2009Table of Contents: “…1. Modeling a jamming game for wireless networks / Andrey Garnaev -- 2. …”
Full text (MFA users only)
Electronic eBook -
1397
Dependable software systems engineering
Published 2016Table of Contents: “…Title Page; Preface; Contents; Probabilistic Model Checking; SMT Solvers: Foundations and Applications; Formal Models for Analyzing Security Protocols: Some Lecture Notes; Parameterized Verification of Crowds of Anonymous Processes; Synthesis of Reactive Systems; Between Testing and Verification: Dynamic Software Model Checking; Learning-Based Compositional Model Checking of Behavioral UML Systems; Programming by Examples (and Its Applications in Data Wrangling); Verification of Concurrent Software; A Tutorial on Mean-Payoff and Energy Games; Equivalence -- Combinatorics, Algebra, Proofs.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
1398
Computational Intelligence, Evolutionary Computing, Evolutionary Clustering Algorithms.
Published 2016Table of Contents: “…TOOLS AND TECHNOLOGIES; 5.3.1. Java; 5.3.2. JavaFX; 5.3.3. Netbeans; 5.3.4. Maven.…”
Full text (MFA users only)
Electronic eBook -
1399
MODELING AND SIMULATION OF LOGISTICS FLOWS : dashboards, traffic planning and management.
Published 2017Table of Contents: “…Minimum-cost transport; 1.6. Linear programming.…”
Full text (MFA users only)
Electronic eBook -
1400
Advances in Network and Distributed Systems Security : IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26-27, 2001, Leuven, Belgium
Published 2002Table of Contents: “…CONTENTS -- PREFACE -- ACKNOWLEDGEMENTS -- PART ONE Reviewed Papers -- A ROLE- BASED SPECIFICATION OF THE SET PAYMENT TRANSACTION PROTOCOL -- INFORMATION SECURITY: MUTUAL AUTHENTICATION IN E- COMMERCE -- SOFTWARE- BASED RECEIPT- FREENESS IN ON- LINE ELECTIONS -- ID-BASED STRUCTURED MULTISIGNATURE SCHEMES -- PROBABILISTIC RELATIONS FOR THE SOLITAIRE KEYSTREAM GENERATOR -- HAZARD ANALYSIS FOR SECURITY PROTOCOL REQUIREMENTS -- SECURING RMI COMMUNICATION -- SECURE JAVA DEVELOPMENT WITH UML -- SECURITY THROUGH ASPECT- ORIENTED PROGRAMMING…”
Full text (MFA users only)
Electronic eBook