Academic literature on the topic 'Lex (Computer file)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Lex (Computer file).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Lex (Computer file)"
Liu, Hai Lang, Cheng De Lin, and Ai Zhen Wang. "Research on a Compiler for NC System Based on PC." Advanced Materials Research 189-193 (February 2011): 2875–78. http://dx.doi.org/10.4028/www.scientific.net/amr.189-193.2875.
Full textMosweu, Tshepho Lydia, and Lekoko Kenosi. "Implementation of the Court Records Management System in the delivery of justice at the Gaborone Magisterial District, Botswana." Records Management Journal 28, no. 3 (2018): 234–51. http://dx.doi.org/10.1108/rmj-11-2017-0033.
Full textAl-Nabki, Wesam, Eduardo Fidalgo, Enrique Alegre, and Rocío Alaiz-Rodríguez. "Short Text Classification Approach to Identify Child Sexual Exploitation Material." Scientific Reports 13, no. 1 (2023): 16108. https://doi.org/10.1038/s41598-023-42902-8.
Full textLi, Chao, Jiagui Xie, Yanan Cheng, et al. "Research on the Construction of High-Trust Root Zone File Based on Multi-Source Data Verification." Electronics 12, no. 10 (2023): 2264. http://dx.doi.org/10.3390/electronics12102264.
Full textKo, Kyung-Kyu, and Eun-Sung Jung. "Development of Cybersecurity Technology and Algorithm Based on Quantum Computing." Applied Sciences 11, no. 19 (2021): 9085. http://dx.doi.org/10.3390/app11199085.
Full textZhuravel, I. M., and L. Z. Mychuda. "VISUALIZATION AND INCREASING THE INFORMATIVENESS OF LARGE GRAPHIC FILES." Ukrainian Journal of Information Technology 4, no. 1 (2022): 78–84. http://dx.doi.org/10.23939/ujit2022.01.078.
Full textYang, Feng, Pu Xuan Lu, Min Deng, et al. "Annotations of Lung Abnormalities in the Shenzhen Chest X-ray Dataset for Computer-Aided Screening of Pulmonary Diseases." Data 7, no. 7 (2022): 95. http://dx.doi.org/10.3390/data7070095.
Full textRyasov, Aleksandr. "THE POSSIBILITY OF OBTAINING AND USING CRIMINALLY SIGNIFICANT INFORMATION FROM FILE METADATA IN THE DETECTION AND INVESTIGATION OF CRIMES." VESTNIK ADVANCED TRAINING INSTITUTE OF THE MIA OF RUSSIA, no. 2 (August 12, 2024): 110–16. http://dx.doi.org/10.29039/2312-7937-2024-2-110-116.
Full textAlukwe, Chrispus. "Enhancing Cybersecurity: Smart Intrusion Detection in File Server SYSTEMS." Journal of Science, Innovation and Creativity 2, no. 1 (2023): 1–6. http://dx.doi.org/10.58721/jsic.v2i1.287.
Full textda Silva, Erico Correia, Liria Matsumoto Sato, and Edson Toshimi Midorikawa. "Distributed File System to Leverage Data Locality for Large-File Processing." Electronics 13, no. 1 (2023): 106. http://dx.doi.org/10.3390/electronics13010106.
Full textDissertations / Theses on the topic "Lex (Computer file)"
Dao, Thi Thu Ha. "Les files et les reseaux zero-automatiques." Phd thesis, Université Paris-Diderot - Paris VII, 2007. http://tel.archives-ouvertes.fr/tel-00195119.
Full textWeis, Frédéric. "Exploitation d'approches système dans les réseaux sans fil." Habilitation à diriger des recherches, Université Rennes 1, 2012. http://tel.archives-ouvertes.fr/tel-00790484.
Full textBoudguiga, Aymen. "Authentification dans les réseaux maillés sans fils avec la cryptographie basée sur l'identité." Phd thesis, Institut National des Télécommunications, 2012. http://tel.archives-ouvertes.fr/tel-00762635.
Full textDarties, Benoit. "Problèmes algorithmiques et de complexité dans les réseaux sans fil." Phd thesis, Université Montpellier II - Sciences et Techniques du Languedoc, 2007. http://tel.archives-ouvertes.fr/tel-00270118.
Full textLasaulce, Samson. "Coopération et Compétition dans les Réseaux sans Fils." Habilitation à diriger des recherches, Université Paris Sud - Paris XI, 2010. http://tel.archives-ouvertes.fr/tel-00845381.
Full textLafourcade, Pascal. "Sécurité assistée par ordinateur pour les primitives cryptgraphiques, les protocoles de vote électronique et les réseaux de capteurs sans fil." Habilitation à diriger des recherches, Université de Grenoble, 2012. http://tel.archives-ouvertes.fr/tel-00807568.
Full textSchiller, Eryk. "Les architectures des réseaux pour des environnements entierement sans fil." Phd thesis, Université de Grenoble, 2010. http://tel.archives-ouvertes.fr/tel-00619262.
Full textAad, Imad. "Qualité de service dans les réseaux locaux sans-fil." Phd thesis, Université Joseph Fourier (Grenoble), 2002. http://tel.archives-ouvertes.fr/tel-00406507.
Full textMailles, Danielle. "Files d'attente descriptives pour la modelisation de la synchronisation dans les systemes informatiques." Paris 6, 1987. http://www.theses.fr/1987PA066503.
Full textAlbu, Roxana. "Architecture de communication pour les réseaux d'instrumentation sans fil." Phd thesis, Institut National Polytechnique de Toulouse - INPT, 2011. http://tel.archives-ouvertes.fr/tel-00619443.
Full textBooks on the topic "Lex (Computer file)"
1965-, Mason Tony, and Brown Doug 1952-, eds. Lex & yacc. 2nd ed. O’Reilly & Assocoates, Inc., 1992.
Find full text(Firm), ActiveEducation, ed. Microsoft Windows 2000 professional: Instructor-led training. Microsoft Press, 2000.
Find full textWhite, Kenneth J. Introduction to the theory and practice of econometrics--a computer handbook using SHAZAM and SAS: For use with Judge-Hill-Griffiths-Lütkepohl-Lee, Introduction to the theory and practice of econometrics, second edition. Wiley, 1988.
Find full textBook chapters on the topic "Lex (Computer file)"
Langer, Markus, and Isabel Valera. "Leveraging Actionable Explanations to Improve People’s Reactions to AI-Based Decisions." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-73741-1_18.
Full textAlam, Sadaf, Javier Bartolome, Sanzio Bassini, et al. "Fenix: Distributed e-Infrastructure Services for EBRAINS." In Lecture Notes in Computer Science. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-82427-3_6.
Full textBuhler, Thomas, Matthieu Adam, Hakim Ramdani, and Pauline Jobard. "Press Discourse on Cycling Before, During, and After the First Covid-19 Lockdown in France. The Rise of the User-Group Voice." In The Urban Book Series. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-45308-3_4.
Full textBirkoben, Tom, Mirko Hansen, Marina Ignatov, Martin Ziegler, and Hermann Kohlstedt. "A Bio-inspired Perceptual Decision-Making Circuit Based on the Hassenstein-Reichardt Direction Detector." In Springer Series on Bio- and Neurosystems. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-36705-2_13.
Full textHoenig, Alan. "Logical Documents Via Latex." In Tex Unbound. Oxford University PressNew York, NY, 1998. http://dx.doi.org/10.1093/oso/9780195096859.003.0004.
Full textKosseff, Jeff. "Online Anonymity and Copyright." In The United States of Anonymous. Cornell University Press, 2022. http://dx.doi.org/10.7591/cornell/9781501762383.003.0009.
Full textS, Vennila, Iyyamma B, and Anbunilavan R. "THE PROGNOSIS IN THE TREATMENT OF COMPUTER VISION SYNDROME." In Futuristic Trends in Medical Sciences Volume 3 Book 9. Iterative International Publisher, Selfypage Developers Pvt Ltd, 2024. http://dx.doi.org/10.58532/v3bfms9p1ch29.
Full textGorfinkel, Elena. "Conclusion." In Lewd Looks. University of Minnesota Press, 2017. http://dx.doi.org/10.5749/minnesota/9781517900175.003.0006.
Full textHemion, Geoffrey. "The final result." In The Classification of Knots and 3-Dimensional Spaces. Oxford University PressOxford, 1993. http://dx.doi.org/10.1093/oso/9780198596974.003.0022.
Full textChion, Michel. "The Composer of musique concrète Wields a Camera." In The Oxford Handbook of Film Theory. Oxford University Press, 2022. http://dx.doi.org/10.1093/oxfordhb/9780190873929.013.24.
Full textConference papers on the topic "Lex (Computer file)"
Cochran, J., and J. T. Bass. "Computer Analysis/Optimization of Anode Geometries for Congested Anode Arrays." In CORROSION 1986. NACE International, 1986. https://doi.org/10.5006/c1986-86047.
Full textLee, Jaewon, Euijun Chung, Saurabh Singh, et al. "Let-Me-In: (Still) Employing In-pointer Bounds Metadata for Fine-grained GPU Memory Safety." In 2025 IEEE International Symposium on High Performance Computer Architecture (HPCA). IEEE, 2025. https://doi.org/10.1109/hpca61900.2025.00122.
Full textBoukharfane, Radouan, and Nabil El Mo�ayd. "Sensitivity Analysis of Key Parameters in LES-DEM Simulations of Fluidized Bed Systems Using Generalized Polynomial Chaos." In The 35th European Symposium on Computer Aided Process Engineering. PSE Press, 2025. https://doi.org/10.69997/sct.116388.
Full textGuo, Yang, Chisachi Kato, Yoshinobu Yamade, Yutaka Ohta, Taku Iwase, and Ryo Takayama. "Numerical Prediction of Noise From the Internal Flow in a Centrifugal Blower." In ASME/JSME/KSME 2015 Joint Fluids Engineering Conference. American Society of Mechanical Engineers, 2015. http://dx.doi.org/10.1115/ajkfluids2015-09194.
Full textThornton, Jay, Dan Bybell, Bill Donovan, and John McCann. "Color Rendering from CMYK Inks into Film Dyes." In Applied Vision. Optica Publishing Group, 1989. http://dx.doi.org/10.1364/av.1989.fa5.
Full textAlharbi, Noha Abdulkhalig M., and Quintin I. Cutts. "An Elaboration of Research Led Computer Science Framework for Early Education." In 2023 IEEE Frontiers in Education Conference (FIE). IEEE, 2023. http://dx.doi.org/10.1109/fie58773.2023.10342646.
Full textThornton, Jay, Jim Burkhardt, Bill Donovan, and John McCann. "High Resolution "Paint by Number"." In Color Appearance. Optica Publishing Group, 1987. http://dx.doi.org/10.1364/ca.1987.tuc3.
Full textAlo, Richard A., Mohsen Beheshti, John Fernandez, Ann Quiroz Gates, and Desh Ranjan. "Work in progress - peer-led team learning implementation in computer science." In 2007 37th annual frontiers in education conference - global engineering: knowledge without borders, opportunities without passports. IEEE, 2007. http://dx.doi.org/10.1109/fie.2007.4417938.
Full textDones, Jaelyn, Fred Martin, Justin Lu, and Foozieh Mir. "Design and Impact of a Near Peer-Led Computer Science Summer Bridge Program." In 2022 IEEE Frontiers in Education Conference (FIE). IEEE, 2022. http://dx.doi.org/10.1109/fie56618.2022.9962588.
Full textKotha, Anita, and James E. Harvey. "Image Degradation due to the Opticam Manufacturing Process." In Optical Fabrication and Testing. Optica Publishing Group, 1996. http://dx.doi.org/10.1364/oft.1996.pdp.1.
Full textReports on the topic "Lex (Computer file)"
DiGrande, Laura, Sue Pedrazzani, Elizabeth Kinyara, et al. Field Interviewer– Administered Dietary Recalls in Participants’ Homes: A Feasibility Study Using the US Department of Agriculture’s Automated Multiple-Pass Method. RTI Press, 2021. http://dx.doi.org/10.3768/rtipress.2021.mr.0045.2105.
Full textMazzoni, Silvia, Nicholas Gregor, Linda Al Atik, Yousef Bozorgnia, David Welch, and Gregory Deierlein. Probabilistic Seismic Hazard Analysis and Selecting and Scaling of Ground-Motion Records (PEER-CEA Project). Pacific Earthquake Engineering Research Center, University of California, Berkeley, CA, 2020. http://dx.doi.org/10.55461/zjdn7385.
Full textL'Estampe en France: Thirty-Four Young Printmakers. Inter-American Development Bank, 1999. http://dx.doi.org/10.18235/0006415.
Full text