| Analyzing Vulnerability of the Belize Coastal Tourism Sector This report discusses the results of a national analysis that looked at identifying coastal tourism areas that are most and least vulnerable to the impacts of climate change in Belize 220.06 Kb. 6 | read |
| A replicable Web-Based Negotiation Server for e-commerce Proceedings of the First Workshop on Internet Based Negotiation Technologies, Yorktown Heights, ny, March 18-19, 1999 82.92 Kb. 1 | read |
| Programming in C: a tutorial Although it has lost little of its didactic value, it describes a language that c compilers today do no longer understand: the c of 1974, four years before Kernighan and Ritchie published the first edition of ``The c programming Language'' 208.59 Kb. 1 | read |
| High-Quality Scalable Checking using Modular Path-Sensitive Analysis Path-Sensitive Loop Widening] Work out the mathematical detail of path-sensitive loop widening. Prove that the algorithm terminates 9.48 Kb. 1 | read |
| Actions which manipulate the contents of variables 74.96 Kb. 1 | read |
| Experimenting with Virtual Reality in a University Library Library. This pilot project existed as part of a greater movement driven by the University’s Technology Services division1, and allowed an examination of how established groups could best exploit a technology on the very forefront of 57.18 Kb. 1 | read |
| Concepts and terminology in the Simula Programming Language This mechanism relied on the processes running in quasi-parallel (as co-routines) and on a queue of scheduled processes sorted on the time they next wanted to do something 46.36 Kb. 1 | read |
| Acknowledgments This primer is mostly a compilation of information found in books / web resources that I highly recommend 165.61 Kb. 3 | read |
| Linked Data Structures: Linked Lists When a person in front of you leaves the line, you move up physically, and if someone breaks into the line ahead of you, you may have to step back. Thus changes in the line affect not only where you are in line 129.01 Kb. 1 | read |
| Federal Plain Language Guidelines We first developed this document in the mid-90s. We continue to revise it every few years to provide updated advice on clear communication. We hope you find this document useful 371.07 Kb. 10 | read |
| Law drives technology in the war against bioterrorism Victoria Sutton Center for Biodefense, Law, and Public Policy, Texas Tech University, 3102 E. 23rd St., Lubbock, tx 79410, usa 68.8 Kb. 1 | read |
| Et 438b sequential Control and Data Acquisition Laboratory 7 plc function Programming Using Ladder Logic Laboratory Learning Objectives Explain the operation of on and off delay timers used in ladder logic and use them in programming exercises 93.09 Kb. 1 | read |
| An Internet-based Negotiation Server for e-commerce Haifei Li, Liu Wang, Youzhong Liu, Charnyote Pluempitiwiriyawej, Minsoo Lee, Herman Lam 178.28 Kb. 9 | read |
| An Internet-based Negotiation Server for e-commerce Stanley Y. W. Su, Chunbo Huang, Joachim Hammer, Yihua Huang, Haifei Li, Liu Wang, Youzhong Liu, Charnyote Pluempitiwiriyawej, Minsoo Lee, Herman Lam 196.85 Kb. 10 | read |
| Programmer’s Reference manual Arbitrary waveform generation and monitoring software for use with the layla 24/96 sound system by 97.45 Kb. 1 | read |