1.
|
Using Exception Handling to Build Opaque Predicates in Intermediate Code Obfuscation Techniques Dolz, Daniel - Parra, Gerardo
|
2.
|
The JK System to Detect Plagiarism Sabri, Khair Eddin M. - Al-Jaafer, Jubair J.
|
3.
|
Computer networks. A top-down approach featuring Internet, second edition, Redes de Computadores – Un enfoque descendente basado en Internet. Segunda edición López, Ricardo A.
|
4.
|
Internet Programming with Java Luján Mora, Sergio
|
5.
|
VisualJVM: a visual tool for teaching Java technology Garrido Abenza, Pedro Pablo - Ledesma Latorre, Bernardo - Grediaga Olivo, Ángel
|
6.
|
EJS+EjsRL: a free Java tool for advanced Robotics simulation and Computer Vision processing Jara Bravo, Carlos Alberto - Candelas Herías, Francisco Andrés - Pomares Baeza, Jorge - Gil Vázquez, Pablo - Torres Medina, Fernando
|
7.
|
Environment for the simulation of different ACP and error recovery in Distributed Data Bases Ruscuni, Sebastián - Bertone, Rodolfo Alfredo
|
8.
|
Real-time collaboration of virtual laboratories through the Internet Jara Bravo, Carlos Alberto - Candelas Herías, Francisco Andrés - Torres Medina, Fernando - Dormido Bencomo, Sebastián - Esquembre Martínez, Francisco - Reinoso García, Óscar
|
9.
|
AURA : a hybrid approach to identify framework evolution Wu, Wei
|
10.
|
Diseño e Implementación de un Sistema de Evaluación Remota con Seguridad Avanzada para Universidades Utilizando Minería de Datos, Design and Implementation of an Advanced Security Remote Assessment System for Universities Using Data Mining Hernández Aguilar, José Alberto - Burlak, Gennadiy - Lara, Bruno
|