Found: 18
Select item for more details and to access through your institution.
The challenges of migrating an active learning classroom online in a crisis.
- Published in:
- Computer Applications in Engineering Education, 2021, v. 29, n. 6, p. 1617, doi. 10.1002/cae.22413
- By:
- Publication type:
- Article
A machine-readable description of generic instructional strategies in e-courses.
- Published in:
- Computer Applications in Engineering Education, 2016, v. 24, n. 5, p. 665, doi. 10.1002/cae.21738
- By:
- Publication type:
- Article
FORENZIKA BLOKČEJNA KRIPTOVALUTE BITKOIN: PREGLED TEHNIKA I ALATA.
- Published in:
- InfoM, 2023, n. 78, p. 36
- By:
- Publication type:
- Article
PREGLED PRIMENA BLOKČEJN TEHNOLOGIJE U ENERGETSKOM SEKTORU.
- Published in:
- InfoM, 2022, n. 75/76, p. 40
- By:
- Publication type:
- Article
UPRAVLJANJE NASTAVNIM OBJEKTIMA ZASNOVANO NA ONTOLOGIJI ZA OPIS DOKUMENATA.
- Published in:
- InfoM, 2015, n. 54, p. 18
- By:
- Publication type:
- Article
DETEKCIJA SIGURNOSNIH PROPUSTA FAZ TESTIRANJEM.
- Published in:
- InfoM, 2013, n. 48, p. 9
- By:
- Publication type:
- Article
MODELOVANJE KONTROLE PRISTUPA.
- Published in:
- InfoM, 2013, n. 45, p. 34
- By:
- Publication type:
- Article
KONTEKSTNO ZAVISNA KONTROLA PRISTUPA.
- Published in:
- InfoM, 2012, n. 41, p. 33
- By:
- Publication type:
- Article
Infrastructure as Software in Micro Clouds at the Edge.
- Published in:
- Sensors (14248220), 2021, v. 21, n. 21, p. 7001, doi. 10.3390/s21217001
- By:
- Publication type:
- Article
A Blockchain Solution for Securing Real Property Transactions: A Case Study for Serbia.
- Published in:
- ISPRS International Journal of Geo-Information, 2021, v. 10, n. 1, p. 35, doi. 10.3390/ijgi10010035
- By:
- Publication type:
- Article
Semantic integration of enterprise information systems using meta-metadata ontology.
- Published in:
- Information Systems & e-Business Management, 2017, v. 15, n. 2, p. 257, doi. 10.1007/s10257-015-0303-6
- By:
- Publication type:
- Article
Blockchain-based model for tracking compliance with security requirements.
- Published in:
- Computer Science & Information Systems, 2023, v. 20, n. 1, p. 359, doi. 10.2298/CSIS210923060M
- By:
- Publication type:
- Article
Computer Aided Anonymization and Redaction of Judicial Documents.
- Published in:
- Computer Science & Information Systems, 2016, v. 13, n. 1, p. 217, doi. 10.2298/CSIS140808038S
- By:
- Publication type:
- Article
Context-sensitive Access Control Model for Business Processes.
- Published in:
- Computer Science & Information Systems, 2013, v. 10, n. 3, p. 939, doi. 10.2298/CSIS110907042S
- By:
- Publication type:
- Article
Access Control Framework for XML Document Collections.
- Published in:
- Computer Science & Information Systems, 2011, v. 8, n. 3, p. 591, doi. 10.2298/CSIS100827002S
- By:
- Publication type:
- Article
Extensible Java EE-Based Agent Framework and Its Application on Distributed Library Catalogues.
- Published in:
- Computer Science & Information Systems, 2009, v. 6, n. 2, p. 1, doi. 10.2298/CSIS0902001V
- By:
- Publication type:
- Article
Towards Cross-Standard Compliance Readiness: Security Requirements Model for Smart Grid.
- Published in:
- Energies (19961073), 2021, v. 14, n. 21, p. 6862, doi. 10.3390/en14216862
- By:
- Publication type:
- Article
Automatic detection of code smells using metrics and CodeT5 embeddings: a case study in C#.
- Published in:
- Neural Computing & Applications, 2024, v. 36, n. 16, p. 9203, doi. 10.1007/s00521-024-09551-y
- By:
- Publication type:
- Article