Architecture Analysis

Results: 1991



#Item
41Speculative Attacks and Financial Architecture: Experimental Analysis of Coordination Games with Public and Private Information* Frank Heinemanna, Rosemarie Nagelb and Peter Ockenfelsc First version 7. August 2001.

Speculative Attacks and Financial Architecture: Experimental Analysis of Coordination Games with Public and Private Information* Frank Heinemanna, Rosemarie Nagelb and Peter Ockenfelsc First version 7. August 2001.

Add to Reading List

Source URL: www.macroeconomics.tu-berlin.de

Language: English - Date: 2011-04-12 09:46:06
42Specification of an Architecture Meta-Model∗ Raphael Weber, Philipp Reinkemeier,  Eike Thaden,

Specification of an Architecture Meta-Model∗ Raphael Weber, Philipp Reinkemeier, Eike Thaden,

Add to Reading List

Source URL: spes2020.informatik.tu-muenchen.de

Language: English - Date: 2012-03-23 03:32:40
43Efficient Parallel Set-Similarity Joins Using MapReduce

Efficient Parallel Set-Similarity Joins Using MapReduce

Add to Reading List

Source URL: asterixdb.ics.uci.edu

Language: English - Date: 2013-06-06 15:43:58
44This article was downloaded by: [Frank, Stefan L.] On: 26 November 2008 Access details: Access Details: [subscription numberPublisher Routledge Informa Ltd Registered in England and Wales Registered Number: 1

This article was downloaded by: [Frank, Stefan L.] On: 26 November 2008 Access details: Access Details: [subscription numberPublisher Routledge Informa Ltd Registered in England and Wales Registered Number: 1

Add to Reading List

Source URL: www.stefanfrank.info

Language: English - Date: 2012-06-04 17:20:42
45Microsoft Word - BATTY-CV-December-2012-new.doc

Microsoft Word - BATTY-CV-December-2012-new.doc

Add to Reading List

Source URL: www.spatialcomplexity.info

Language: English - Date: 2012-12-31 15:03:21
461  Punishment in Selfish Wireless Networks: A Game Theoretic Analysis Dave Levin Abstract— In currently deployed wireless networks, rational

1 Punishment in Selfish Wireless Networks: A Game Theoretic Analysis Dave Levin Abstract— In currently deployed wireless networks, rational

Add to Reading List

Source URL: netecon.seas.harvard.edu

Language: English - Date: 2009-12-16 17:13:12
47Parallel Computing: On the Road to Exascale G.R. Joubert et al. (Eds.) IOS Press, 2016 © 2016 The authors and IOS Press. All rights reserved. doi:

Parallel Computing: On the Road to Exascale G.R. Joubert et al. (Eds.) IOS Press, 2016 © 2016 The authors and IOS Press. All rights reserved. doi:

Add to Reading List

Source URL: www.cse-lab.ethz.ch

Language: English - Date: 2016-07-02 10:56:26
48Safe MDE concerns Certification and Qualification Application to Code generation tools Application to Static analysis tools  Certification and qualification concerns in the

Safe MDE concerns Certification and Qualification Application to Code generation tools Application to Static analysis tools Certification and qualification concerns in the

Add to Reading List

Source URL: d3s.mff.cuni.cz

Language: English - Date: 2010-08-20 05:35:01
49Performance Analysis and Acceleration of Explicit Integration for Large Kinetic Networks using Batched GPU Computations Azzam Haidar∗ , Benjamin Brock∗† , Stanimire Tomov∗ , Michael Guidry∗† , Jay Jay Billing

Performance Analysis and Acceleration of Explicit Integration for Large Kinetic Networks using Batched GPU Computations Azzam Haidar∗ , Benjamin Brock∗† , Stanimire Tomov∗ , Michael Guidry∗† , Jay Jay Billing

Add to Reading List

Source URL: icl.cs.utk.edu

Language: English - Date: 2016-07-29 14:42:18
50Using Design Cohesion to Visualize, Quantify, and Restructure   Software

Using Design Cohesion to Visualize, Quantify, and Restructure  Software

Add to Reading List

Source URL: www.cs.colostate.edu

Language: English - Date: 2002-08-13 16:57:52