Compute!

Results: 1494



#Item
191PAID FOR BY THE NORTH CAROLINA DEMOCRATIC PARTY  Content Overview ......................................................................................................................................... 2 Important Inf

PAID FOR BY THE NORTH CAROLINA DEMOCRATIC PARTY Content Overview ......................................................................................................................................... 2 Important Inf

Add to Reading List

Source URL: ec2-54-164-184-97.compute-1.amazonaws.com

Language: English - Date: 2016-06-16 12:12:07
192National Research Data Repository Todd Trann GlobusWorld - April 21, 2016 Compute Canada Regions and Members

National Research Data Repository Todd Trann GlobusWorld - April 21, 2016 Compute Canada Regions and Members

Add to Reading List

Source URL: www.globusworld.org

Language: English - Date: 2016-04-22 12:37:04
193Algorithms and Data Structures Winter TermExercises for Unit 8 s 1. Compute the square of the following polynomial using the Fourier transform method discussed

Algorithms and Data Structures Winter TermExercises for Unit 8 s 1. Compute the square of the following polynomial using the Fourier transform method discussed

Add to Reading List

Source URL: www-tcs.cs.uni-sb.de

Language: English - Date: 2016-03-04 02:21:01
194REGION-BASED MEMORY MANAGEMENT FOR EXPRESSIVE GPU PROGRAMMING Eric Holk  Submitted to the faculty of the University Graduate School

REGION-BASED MEMORY MANAGEMENT FOR EXPRESSIVE GPU PROGRAMMING Eric Holk Submitted to the faculty of the University Graduate School

Add to Reading List

Source URL: blog.theincredibleholk.org

Language: English - Date: 2016-07-28 23:54:43
195Make Open Compute Project Technology Work for You Kevin Schlichter, Platform and Solutions Architect

Make Open Compute Project Technology Work for You Kevin Schlichter, Platform and Solutions Architect

Add to Reading List

Source URL: www.whd.global

Language: English - Date: 2016-03-30 07:37:51
196Architecting for Genomic Data Security and Compliance in AWS Working with Controlled-Access Datasets from dbGaP, GWAS, and other Individual-Level Genomic Research Repositories Angel Pizarro

Architecting for Genomic Data Security and Compliance in AWS Working with Controlled-Access Datasets from dbGaP, GWAS, and other Individual-Level Genomic Research Repositories Angel Pizarro

Add to Reading List

Source URL: d0.awsstatic.com

Language: English - Date: 2014-12-11 13:54:38
197How	to	Compute	a	Large	Tree	 (with	or	without	an	alignment) This	talk	 •  Part	1:	How	to	get	a	good	alignment	 •  Part	2:	How	to	get	a	good	tree	from	a	good

How to Compute a Large Tree (with or without an alignment) This talk •  Part 1: How to get a good alignment •  Part 2: How to get a good tree from a good

Add to Reading List

Source URL: tandy.cs.illinois.edu

Language: English - Date: 2016-08-02 03:01:56
198Amazon Web Services – Best Practices for Amazon EMR  Best Practices for Amazon EMR Parviz Deyhim August 2013

Amazon Web Services – Best Practices for Amazon EMR Best Practices for Amazon EMR Parviz Deyhim August 2013

Add to Reading List

Source URL: media.amazonwebservices.com

Language: English - Date: 2013-09-24 16:44:45
199BYLAWS OF OPEN COMPUTE PROJECT FOUNDATION As Amended 5 August 2015  BYLAWS

BYLAWS OF OPEN COMPUTE PROJECT FOUNDATION As Amended 5 August 2015 BYLAWS

Add to Reading List

Source URL: opencompute.org

Language: English - Date: 2016-03-24 19:28:14
200Review of last lecture  Architecture case studies  Memory performance is often the bottleneck  Parallelism grows with compute performance

Review of last lecture  Architecture case studies  Memory performance is often the bottleneck  Parallelism grows with compute performance

Add to Reading List

Source URL: spcl.inf.ethz.ch

Language: English - Date: 2013-11-03 08:27:59