Search Constraints
« Previous |
1 - 20 of 90
|
Next »
Search Results
Select an image to start the slideshow
MARA and public user characteristics in response to phishing emails
1 of 20
Integration of operations research and artificial intelligence approaches to solve the nurse rostering problem
2 of 20
Closing the gap between guidance and practice : an investigation of the relevance of design guidance to practitioners using object-oriented technologies
3 of 20
On the Möbius function and topology of the permutation poset
4 of 20
Studying the lives of software bugs
5 of 20
Pragmatic cost estimation for web applications
6 of 20
Investigating effective inspection of object-oriented code
7 of 20
Planning as Quantified Boolean Formulae
8 of 20
A comparative analysis of algorithms for satellite operations scheduling
9 of 20
Exploring the information seeking behaviour of Muslim migrants in Scotland, a Glasgow case of study
10 of 20
Navigating social systems : information behaviour in refugee integration
11 of 20
Critical information literacy and political agency : a critical, phenomenographic and personal construct study of young people's experiences of political information
12 of 20
Generalising plans to influence landscapes for robust agent execution in virtual worlds
13 of 20
Algebraic methods for incremental maintenance and updates of views within XML databases
14 of 20
Understanding emergence : a pragmatic interdisciplinary approach
15 of 20
Robotic navigation and spatial reasoning in uncertain environments with a navigation mesh
16 of 20
Extracting and exploiting interaction information in constraint-based local search
17 of 20
Evaluating readability as a factor in information security policies
18 of 20
Understanding the motivators and barriers for adolescents using digital diabetes technology to manage glycaemia in type 1 diabetes
19 of 20
A new heuristic-based model of goal recognition without libraries
20 of 20