Computer

Results: 301026



#Item
911

Collaborative Development and Evaluation of Text-processing Workflows in a UIMA-supported Web-based Workbench Rafal Rak, Andrew Rowley, Sophia Ananiadou National Centre for Text Mining and School of Computer Science, Uni

Add to Reading List

Source URL: www.lrec-conf.org

Language: English - Date: 2012-05-16 13:57:38
    912

    9 Controller Discretization In most applications, a control system is implemented in a digital fashion on a computer. This implies that the measurements that are supplied to

    Add to Reading List

    Source URL: arrow.utias.utoronto.ca

    Language: English - Date: 2008-02-14 10:02:21
      913

      Ethics Building an Active Computer Security Ethics Community In spite of significant ethical challenges faced by

      Add to Reading List

      Source URL: nsrg.ece.illinois.edu

      Language: English - Date: 2018-06-11 12:51:20
        914

        An Introduction to computer adventures T

        Add to Reading List

        Source URL: mirrors.ibiblio.org

        Language: English - Date: 2013-07-06 01:19:20
          915

          University Computer Club Freshers Guide 2003 www.ucc.asn.au Events

          Add to Reading List

          Source URL: www.ucc.asn.au

          Language: English - Date: 2004-02-12 04:51:11
            916

            2018 IEEE International Symposium on High Performance Computer Architecture OuterSPACE: An Outer Product based Sparse Matrix Multiplication Accelerator Subhankar Pal∗ Jonathan Beaumont∗ Dong-Hyeon Park∗ Aporva Ama

            Add to Reading List

            Source URL: blaauw.engin.umich.edu

            Language: English - Date: 2018-04-06 13:27:35
              917

              A least-squares approach to anomaly detection in static and sequential data John A. Quinna , Masashi Sugiyamab a Department b Department of Computer Science, Makerere University, PO Box 7062, Kampala, Uganda

              Add to Reading List

              Source URL: cit.mak.ac.ug

              Language: English - Date: 2018-08-07 07:34:11
                918Computing / Internet / Information and communications technology / Proxy servers / Internet censorship in China / Internet privacy / Internet security / Secure communication / Tor / Great Firewall / Internet censorship

                iii Enhancing Censorship Resistance in the Tor Anonymity Network Philipp Winter Department of Mathematics and Computer Science

                Add to Reading List

                Source URL: nymity.ch

                Language: English - Date: 2017-08-25 13:31:01
                919

                1 INTRODUCTION TO EDITING: HELLO WORLD! Most programs involve communication between the user and the computer. The user usually needs to provide input- information telling the program details of the task to be performed

                Add to Reading List

                Source URL: singh.ucdavis.edu

                Language: English - Date: 2017-07-05 18:38:53
                  920

                  Publishing Your Research Chris Winstead Department of Electrical and Computer Engineering Utah State University November 18, 2014

                  Add to Reading List

                  Source URL: ece.usu.edu

                  Language: English - Date: 2018-08-14 17:11:18
                    UPDATE