Methodology and Computer Techniques
Results: Displaying 10 of 154 on page 7 of 16
Name
Title
Area
Document
Colleges
Year
Computational classification of moral foundations from text
Vulnerability analysis in health information system: potential source of irregularities...
A study on the accessibility awareness of mobile application developers in Brazi...
Data representation and processing architecture to support healthcare team manag...
Limits to surprise of recommender systems
A composite approach for expert finding in academic social networks
Bot detection on Twitter: an alternative using clustering
PYP4Training - Ludifying Business Process Training
AllianceScan: an approach for identifying disfluencies in Brazilian Portuguese applied...
Application of clustering algorithms for discovering bug patterns in JavaScript ...
Results: Displaying 10 of 154 on page 7 of 16