Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,682,161 papers from all fields of science
Search
Sign In
Create Free Account
Do while loop
Known as:
Do-while
, Do while
, Do...while loop
Expand
In most computer programming languages, a do while loop is a control flow statement that executes a block of code at least once, and then repeatedly…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
36 relations
ActionScript
Ada
BASIC
C++
Expand
Broader (1)
Control flow
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Activities and Technology Usage while Driving: A Field Study with Private Short-Distance Car Commuters
Nicole Perterer
,
C. Moser
,
Alexander Meschtscherjakov
,
Alina Krischkowsky
,
M. Tscheligi
Nordic Conference on Human-Computer Interaction
2016
Corpus ID: 587282
Despite its high costs and stressful traffic congestions, solo driving is still the number one commuting choice. In order to…
Expand
2015
2015
Watch-Bot: Unsupervised learning for reminding humans of forgotten actions
Chenxia Wu
,
Jiemi Zhang
,
B. Selman
,
S. Savarese
,
Ashutosh Saxena
IEEE International Conference on Robotics and…
2015
Corpus ID: 14361466
We present a robotic system that watches a human using a Kinect v2 RGB-D sensor, detects what he forgot to do while performing an…
Expand
2005
2005
Learning Assessment by Designing Assessments: An On-line Formative Assessment Design Tool
Terry P. Vendlinski
,
D. Niemi
,
Jia Wang
2005
Corpus ID: 113267475
The Assessment Design and Delivery System (ADDS) is a web-based assessment design tool developed by teachers and researchers at…
Expand
2005
2005
Network-Based Learning and Assessment Applications on the Semantic Web
David Gibson
2005
Corpus ID: 61117590
Today's Web applications are already "aware" of the network of computers and data on the Internet, in the sense that they…
Expand
2004
2004
A LSB Substitution Oriented Image Hiding Strategy Using Genetic Algorithms
Ming-Ni Wu
,
Min-Hui Lin
,
Chinchen Chang
Advanced Workshop on Content Computing
2004
Corpus ID: 37467303
Image hiding is an important technique in information security field. The simplest method is the least significant bit (LSB…
Expand
2002
2002
Design and deployment of community systems: reflections on the Campiello experience
A. Agostini
,
G. Michelis
,
M. Divitini
,
A. Grasso
,
Dave Snowdon
Interacting with computers
2002
Corpus ID: 14767405
2002
2002
From alley cropping to rotational fallow: Farmers' involvement in the development of fallow management techniques in the humid forest zone of Cameroon
J. Kanmegne
,
A. Degrande
Agroforestry Systems
2002
Corpus ID: 23511696
Alley cropping was introduced in the humid forest zone of Cameroon to increase soil fertility in 1987, but until 1992 the…
Expand
1996
1996
Using conscious reflection, group processes, and AI to facilitate development of expertise
R. Mathews
,
I. Lane
,
Lewis G. Roussel
,
M. Nagy
,
Dawn E. Haptonstahl
,
Drew B. Brock
Journal of experimental and theoretical…
1996
Corpus ID: 6481718
Three experiments investigated procedures derived from research on knowledge acquisition, group processes, and artificial…
Expand
1986
1986
Operators for program control
Edward V. Eusebi
APL Conference
1986
Corpus ID: 38607542
Structured programming constructs such as if-then-else and do-while have traditionally been used to give a natural flow to…
Expand
Highly Cited
1984
Highly Cited
1984
Advanced Accounting
T. Doupnik
,
J. Hoyle
,
T. Schaefer
1984
Corpus ID: 169625494
The approach used by Hoyle, Schaefer, and Doupnik in the new edition allows students to think critically about accounting, just…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required