منابع مشابه
A Summer Programming Workshop for Middle School Girls
Westminster College runs a math, science, and computing summer camp for middle school girls called AWE+SUM. Core to the camp is a set of workshops that allow for creative hands-on experiments and exploration. One of the most popular workshops is called “Programming with Alice” where we introduce the girls to programming concepts through Carnegie Mellon University’s Alice software. This paper de...
متن کاملNerding for Newbies 2014 A Summer School in Computers & Programming
Recruiting students to informatics can be a challenge, particularly when it comes to recruiting female students. The Department of Informatics at the University of Bergen has had severe problems with both recruitment and retention of female students. As part of an effort to raise interest in computers and programming in general, and among women in particular, we organised a two-week summer scho...
متن کاملProgramming mental state abduction
Many multi-agent system applications involve software agents that reason about the behavior of other agents with which they interact in cooperation or competition. In order to design and develop those systems, the employed programming languages should provide tools to facilitate the implementation of agents that can perform such reasoning. This paper focuses on BDI-based programming languages a...
متن کاملLiquid State Genetic Programming
A new Genetic Programming variant called Liquid State Genetic Programming (LSGP) is proposed in this paper. LSGP is a hybrid method combining a dynamic memory for storing the inputs (the liquid) and a Genetic Programming technique used for the problem solving part. Several numerical experiments with LSGP are performed by using several benchmarking problems. Numerical experiments show that LSGP ...
متن کاملAuthorization and antichains
Access control has been an important issue in military systems for many years and is becoming increasingly important in commercial systems. There are three important access control paradigms: the Bell-LaPadula model, the protection matrix model and the role-based access control model. Each of these models has its advantages and disadvantages. Partial orders play a significant part in the role-b...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Summer Academe
سال: 2013
ISSN: 1091-8515
DOI: 10.5203/sa.v7i0.512