منابع مشابه
Requisitos para Softwares Educacionais Gamificados: Uma Revisão Sistemática de Literatura
Gamification techniques are being inserted in educational environments with the goal of engaging users in the context of learning. However, despite this importance, there is no complete and well defined set of requirements for gamified educational environments. Motivated by this scenario, this work conducted a systematic literature review in order to investigate aspects of gamification for educ...
متن کاملCilindros capilares: relato de três casos e revisão da literatura
Hair casts are small white yellowish keratinous structures that totally wrap the hair shaft. They are characterized by asymptomatic, semifirm, tannish, freely movable, cylindrical masses, distributed along the scalp hair. This condition has been found in three women, whose case histories are described.
متن کاملPadrões de Escrita de Requisitos: um mapeamento sistemático da literatura
The requirements elicitation is reported in the literature as essential to the success of software development projects. The existence of requirements patterns aimed at not only improving the quality of requirements specifications, but also the reuse of successful solutions of previous experience in new projects. In this paper, we present the results of a systematic literature mapping on requir...
متن کاملImpact of burning mouth syndrome on quality of life Impacto da síndrome da ardência bucal na qualidade de vida
Results: The overall score of the WHOQOL-26 was significantly lower in the group with the disorder (P<0.001). The patients with BMS also displayed significantly lower scores when compared to controls in relation to the psychological and physical domains of the instrument (P=0.005 and P<0.001, respectively). There was no significant difference between BMS and control patients with respect to sco...
متن کاملSegurança em Redes-em-Chip: Conceitos e Revisão do Estado da Arte
Networks-on-Chip (NoCs) aim at meeting the communication scalability required by Systems-on-Chip (SoCs), which are computing systems integrated into a single chip. As well as traditional distributed systems, a SoC and its network are susceptible to attacks to their security properties. This paper presents a survey that was conducted in order to identify the techniques that have been applied to ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Publicatio UEPG: Ciencias Biologicas e da Saude
سال: 2006
ISSN: 1809-0273
DOI: 10.5212/publ.biologicas.v.12i2.0004