Showing 181 to 195 of 271 (19 Pages)
Show:
Showing 181 to 195 of 271 (19 Pages)
Show:
Sort By:

Card List Article

The limitations of analytical methods in practical applications, the advent of high speed computers and increasing demand for numerical solutions to v..

Card List Article

Recent years, a large focus on fundamental principles in the design, analysis, implementation of programming languages and programming interfaces has ..

Card List Article

Network analysis is the process of finding the voltages across, and the currents through, every component in the network. Network synthesis is a metho..

Card List Article

System programming is the activity of programming computer system software. System programming produces software that accesses and controls the inner ..

Card List Article

The effective management of software projects involves four P-s: people, product,process, and project. The manager that will forget people?s aspect of..

Card List Article

Information security is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection..

Card List Article

Java is the foundation for virtually every type of networked application and is the global standard for developing and delivering embedded and mobile ..

Card List Article

A distributed database is a database in which storage devices are not all attached to a common processing unit such as the CPU, and which is controlle..

Card List Article

Artificial neural networks are graphical structures whose initial purpose was to emulate the human brain. They were introduced in 1943 by McCulloch an..

Card List Article

A multimedia system is a system capable of processing multimedia data and applications. A multimedia system is characterized by the processing, storag..

Card List Article

Software systems engineering is the branch of systems engineering concerned with the development of large and complex software intensive systems. This..

Card List Article

The need for computer and network security dates since the ?80-s of the last century. The first computer networks were local and in an academic settin..

Card List Article

Asymptotic algorithm analysis is a methodology which has been given a lot of attention recently. Several methods of asymptotic analysis are considered..

Card List Article

A database is an organized collection of data. It is the collection of schemas, tables, queries, reports, views and other objects. A data warehouse is..

Card List Article

Information ethics is a term used to describe the study and evaluation of the various ethical issues that arise in a world that is driven by the shari..

Brand Slider