Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,398,554 papers from all fields of science
Search
Sign In
Create Free Account
Hackety Hack
Hackety Hack is an open source application that teaches individuals how to create software. It combines an IDE with an extensive Lessons system. The…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
11 relations
Alice
Camping, the 4k microframework
Integrated development environment
List of educational programming languages
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Toward More Secure and Trustworthy Transportation Cyber-Physical Systems
Wei Li
,
H. Song
,
Y. Wei
,
Feng Zeng
2017
Corpus ID: 168884423
Cyber-physical systems (CPS) and cyber infrastructure are key elements of the national infrastructure, and securing them is of…
Expand
2016
2016
The E-Textiles Bracelet Hack: Bringing Making to Middle School Classrooms
Kristin A. Searle
,
Colby Tofel-Grehl
,
V. Allan
Annual Conference on Creativity and Fabrication…
2016
Corpus ID: 155516
In this paper, we present an electronic textiles project called the "bracelet hack" that is intended to facilitate the…
Expand
Review
2015
Review
2015
Wartune Hack - 2015 No Survey No Password
mitchellfrom
2015
Corpus ID: 60824249
Visit http://tinyurl.com/wartunehack018dg Wartune is a wonderful game but there are usually those moments when factors don’t…
Expand
2014
2014
The quinoa hack: A critique
J. Berson
2014
Corpus ID: 141600203
2014
2014
Chapter 4: Kathy Acker or Catheter the Hack
M. Campbell
2014
Corpus ID: 142203970
I. Introducing aborted identity and the narrative non-sequiturKathy Acker kickstarts her Don Quixote with a striking piece of…
Expand
2014
2014
iWorm hack shows Macs are vulnerable too.
W. Buchanan
2014
Corpus ID: 60673574
The computer operating systems and applications we use today have often evolved over many years, decades even, and contain tens…
Expand
2011
2011
Implication of active structure in the upper reaches of Weihe river basin from stream length-gradient index(SL index)and Hack profile
DU Gong-yuan
2011
Corpus ID: 131491719
The stream length-gradient SL index,Hack profile and gradient index(SL/K) were examined forconcavity studies of each profile and…
Expand
2010
2010
Using a software exploit to image RAM on an embedded system
Joseph R. Rabaiotti
,
C. Hargreaves
Digital Investigation. The International Journal…
2010
Corpus ID: 14123744
2007
2007
Based on cryptosystem secure communication between set-top box and smart card in DTV broadcasting
Ting-Wei Hou
,
Jiun-Tze Lai
,
Chun-Lin Yen
IEEE Region 10 Conference
2007
Corpus ID: 41302932
The Conditional Access System (CAS) technology is applied in pay TV systems to help the service providers to control users…
Expand
2005
2005
轻轻松松抓肉鸡(二)PHPMyAdmin+Google Hack
SDRing
2005
Corpus ID: 176377424
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE