Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for ''
published presentations and documents on DocSlides.
MakeMyTrip Mobile Apps
by celsa-spraggs
Available on –. Android. . iPhone. . BlackB...
SENTIMENT, OPINIONS, EMOTIONS
by min-jolicoeur
Heng. . Ji. jih@rpi.edu. October . 28, 2015. Ack...
Evaluating Usability
by sherrill-nordquist
Data & Analysis. Types of Data. And how to re...
You Are How You Click
by briana-ranney
Clickstream Analysis for . Sybil. D. etection. G...
1 GOOD GUYS VS BAD GUYS:
by debby-jeon
USING BIG DATA TO COUNTERACT ADVANCED THREATS . ...
Context-aware communication
by mitsue-stanley
Moquan Chen & Stian Kilaas. Introduction. Con...
Chapter 10
by pamella-moone
ESTABLISHING REQUIREMENTS. Overview. . The impo...
Distributed Development:
by alida-meadow
Lessons learned by Herschel. GRITS 2011, June 17....
User Choices and Regret: Understanding Users’ Decision Process about consensually acquired spyware
by trish-goza
Nathaniel Good, Jens Gossklags, and David Thaw ar...
Prototyping
by cheryl-pisano
Why bother with prototypes? . Approaches to proto...
Conflict of Interest
by yoshiko-marsland
I am a co-founder of Shadow Health, Inc., an educ...
INFM 603: Information Technology and Organizational Context
by debby-jeon
Jimmy Lin. The . iSchool. University of Maryland....
CS 533 Concepts of operating systems
by myesha-ticknor
The . Multikernel. : A New OS Architecture for Sc...
Supervision in Adult Social Work and Social Care settings w
by cheryl-pisano
a . systems approach to providing evidence to imp...
4G Operator experiences: Methods to maintain a good reputat
by lindy-dunigan
4GWE Miami, Feb 2010. Friday - 2/4/10. 10:15-10:5...
Is Software Testing still a good career choice?
by calandra-battersby
Raji Bhamidipati. TMF Summit 2014. About me. BA i...
Resilient Distributed Datasets
by myesha-ticknor
: . A Fault-Tolerant Abstraction for In-Memory Cl...
INFM 603: Information Technology and Organizational Context
by karlyn-bohler
Jimmy Lin. The . iSchool. University of Maryland....
Using HTCSS Adstash to Increase Goodput
by zyair
Jason Patton. Center for High Throughput Computing...
Pretty Good Privacy Dan Fleck
by isla
CS 469: Security Engineering. These slides are mod...
[READ] - Drinking Distilled: A User\'s Manual
by WarrenNielsen
An opinionated, illustrated guide for cocktail beg...
Peterdy 15 Budapest H1071 Hungarywwwlightwarecom
by mary
VIJU UPGRADES OIL AND GAS ONSHORE OPERATIONS CENTE...
OTTR Admin Best Practices
by greemeet
OUI 2016. Submitting good support tickets. Disaste...
S.ESWAR SAI , IV CSE
by cleverfan
. EYE-GAZE . COMMUNICATION. (Eye gaze human compu...
Development & Technologies
by luanne-stotts
inside. A DIfferent 3-Kingdoms. TipCat Interactiv...
CS3235: Introduction to Computer Security
by tawny-fly
Lecture . 4: Malware. CS3235 Lecture 4. 1. Review...
Gigablast is a search engine with some interesting features good advanced search power and an excellent user experience httpwww
by marina-yarberry
gigablastcom brPage 2br offers a pretty cool inte...
System development methodologies
by luanne-stotts
Structured design. Waterfall development. Paralle...
Introduction to Software Construction
by test
Chapter 1-3. What Is Software Construction?. What...
Prototyping
by natalia-silvester
CPSC 481: HCI I. Fall 2014. 1. Anthony Tang, with...
Introduction to Software Testing
by giovanna-bartolotta
(. 2nd edition. ). Chapter 4. Putting Testing Fir...
SENTIMENT, OPINIONS, EMOTIONS
by lindy-dunigan
Heng. . Ji. jih@rpi.edu. October . 25, 2016. Ack...
EDUCATIONAL DEVELOPMENT CENTRE
by natalia-silvester
. Topics for Discussion. What is course design. ...
You’re in Good Hands:
by luanne-stotts
Data Protection Outside of Enclaves . . Lisa N...
User Stories Applied for Agile Software Development Mike Cohn Boston San Franci
by tawny-fly
To create good sto ries we focus on six attribute...
Load More...