Computer case

Results: 3867



#Item
151Graph theory / Mathematics / Line graph / Tree / Random graph / Graph labeling / Graph / Graph coloring / Centrality

Ephemeral Networks with Random Availability of Links: The case of fast networksI Eleni C. Akridaa,∗, Leszek Gąsienieca , George B. Mertziosb , Paul G. Spirakisa,c,d a Department of Computer Science, University of Liv

Add to Reading List

Source URL: community.dur.ac.uk

Language: English - Date: 2015-10-21 12:18:19
152Computing / Computer architecture / Concurrency control / Software / Transaction processing / Transactional memory / Microkernel / Software transactional memory / Transactional Synchronization Extensions / L4 microkernel family / Rock / Mach

Transactional IPC in Fiasco.OC Can we get the multicore case verified for free? Till Smejkal, Adam Lackorzynski, Benjamin Engel and Marcus Völp Operating Systems Group Technische Universität Dresden, Germany

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2016-07-14 16:23:27
153Online algorithms / Analysis of algorithms / Cache / Computer science / Applied mathematics / Mathematics / Cache algorithms / Algorithm / Competitive analysis / Computational complexity theory / Page replacement algorithm

CS264: Beyond Worst-Case Analysis Lecture #4: Parameterized Analysis of Online Paging∗ Tim Roughgarden† October 1,

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2014-11-02 12:34:37
154

COMpUTER CaSE kEyBOARD wEBsITE

Add to Reading List

Source URL: hello-ruby-production.s3.amazonaws.com

- Date: 2014-11-17 11:20:38
    155Scientific modeling / Computational science / Science / Alternatives to animal testing / Computer simulation / Virtual reality / Simulation / Modeling and simulation / Scientific modelling / Electromagnetism / Computer science / Agent-based model

    A SCIENCE-BASED CASE FOR LARGE-SCALE SIMULATION Volume 2 Office of Science U.S. Department of Energy

    Add to Reading List

    Source URL: wgropp.cs.illinois.edu

    Language: English - Date: 2006-07-27 16:56:44
    156Cyberwarfare / Computer security / Computing / Hacking / Computer network security / Cryptography / National security / Cross-site request forgery / Oscar / SQL injection / Cross-site scripting / Application security

    oscar Oscar’s radical approach to healthcare requires unparalleled application security CASE STUDY: ENTERPRISE APPLICATION

    Add to Reading List

    Source URL: www.prevoty.com

    Language: English - Date: 2016-08-18 22:09:36
    157Real estate / Construction / Building information modeling / Computer-aided design / Data modeling / Building engineering / Scandic Hotels / Pyry / Architect

    Case Vierumäki Resort & Congress Hotel EPBL BIM seminar Petri Toivari BIM Manager Pöyry Architects

    Add to Reading List

    Source URL: www.epbl.ee

    Language: English - Date: 2014-08-26 01:19:29
    158Automated theorem proving / Logic / Cognitive science / Theoretical computer science / Reasoning / Artificial intelligence / Research councils / Automated reasoning / Alan Bundy / Reasoning system / Isabelle / Mathematical proof

    The Integration and Interaction of Multiple Mathematical Reasoning Processes: A Platform Grant Proposal. Case for Support Alan Bundy

    Add to Reading List

    Source URL: dream.inf.ed.ac.uk

    Language: English - Date: 2005-03-23 10:49:26
    159Cybercrime / Security / Misconduct / Cyberwarfare / Computer security / Phishing / Internet security / Supply chain attack / Cyber-Insurance

    Information Technology Services & Health Systems IT Cyber Security – Case Studies • • •

    Add to Reading List

    Source URL: senate.ucsd.edu

    Language: English - Date: 2016-05-26 13:04:30
    160Access control / Prevention / Password / Security / Computer access control / Login / Academic term / Case sensitivity

    OASIS Student User’s Manual Online Academic Student Information System by

    Add to Reading List

    Source URL: www.benedictine.edu

    Language: English - Date: 2016-06-28 18:35:34
    UPDATE