Computer case

Results: 3867



#Item
171Sorting algorithms / Mathematics / Computer programming / Software engineering / Quicksort / Merge sort / Best /  worst and average case / Binary search algorithm / Recursion / Binary logarithm / Heapsort / Insertion sort

Analysis with parallel partition 11 —  We know a pack is O(n) work, O(log n) span ¡  Based

Add to Reading List

Source URL: twiki.di.uniroma1.it

Language: English - Date: 2015-10-28 09:23:18
172Videotelephony / Computer-mediated communication / Technology / Computing / Plantronics / Headset / Cisco Systems / Softphone / Videoconferencing / Telepresence / WebEx / Bluetooth

See Eye to Eye from Anywhere Plantronics and Cisco bring remote team members together USE CASE CHALLENGE: Three stakeholders who work in different cities are required to collaborate as a close-knit team on weekly project

Add to Reading List

Source URL: www.plantronics.com

Language: English - Date: 2016-01-20 13:46:06
173GIS software / Intergraph / Pressure vessel / PV / Computer-aided design / Technology

CASE STUDY: WELDFIT ENERGY GROUP, US FACTS AT A GLANCE Company: WeldFit Energy Group Website: www.weldfit.com Description: WeldFit Energy Group is

Add to Reading List

Source URL: www.coade.com

Language: English - Date: 2016-06-02 09:11:16
174Computer hardware / Tablet computers / Computing / Videotelephony / Technology / Alcatel-Lucent / Avaya / Plantronics / Headset / IPad

Instantaneous Storewide Communications Plantronics and Avaya enable connected mobility on the retail floor Use Case

Add to Reading List

Source URL: www.plantronics.com

Language: English - Date: 2016-05-30 18:16:18
175Remote desktop / Micro Focus International / Attachmate / Ericom Software / Minicomputers / Mainframe computer / Emulator / Desktop virtualization / Virtualization / Thin client / IBM mainframe / Unisys

Extending Application Access with a Unified Terminal Emulation Solution: A Customer Case-in-Point Solutions that provide terminal emulation and host access to an enterprise’s deeply entrenched, mission-critical busines

Add to Reading List

Source URL: www.attachmate.com

Language: English - Date: 2014-06-05 12:06:04
176Compiler construction / Real-time computing / Worst-case execution time / Programming language implementation / Basic block / Compiler / Control flow

Retargetable Infeasible Path Detection for WCET Analysis Zach Hall, Kory Kraft, Thomas Mincher, Joey Iannetta, Chris Healy Department of Computer Science Furman University

Add to Reading List

Source URL: www.control.lth.se

Language: English - Date: 2015-07-09 03:36:07
177National security / Crime prevention / Cryptography / Information governance / Cyberwarfare / Computer security / Privacy / Internet privacy / Information security

EEMA online May 2015 Issue 9 EEMA news eID: The business case for the banking and finance community 5 June 2015, Department for Business, Innovation and Skills, London If you are interested in attending this workshop, pl

Add to Reading List

Source URL: www.eema.org

Language: English - Date: 2016-05-13 04:17:11
178Sorting algorithms / Analysis of algorithms / External sorting / Merge sort / Algorithm / Randomized algorithm / Samplesort / Selection algorithm / In-place algorithm / Time complexity / The Art of Computer Programming / Best /  worst and average case

Scalable Distributed-Memory External Sorting Mirko Rahn, Peter Sanders, Johannes Singler4 Karlsruhe Institute of Technology Postfach 6980, 76128 Karlsruhe, Germany arXiv:0910.2582v1 [cs.DS] 14 Oct 2009

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2009-10-14 08:51:26
179Avionics / Theoretical computer science / Aircraft collision avoidance systems / Warning systems / Traffic collision avoidance system / Air traffic control / Formal methods / Self-separation / Unmanned aerial vehicle / Formal verification

Formal Methods in Air Traffic Management: The Case of Unmanned Aircraft Systems (Invited Lecture)? C´esar A. Mu˜ noz NASA Langley Research Center, Hampton, Virginia

Add to Reading List

Source URL: shemesh.larc.nasa.gov

Language: English - Date: 2015-11-24 11:55:34
180Networking hardware / Server appliance / Internet protocols / Internet Standards / Domain name system / Resolver / The Spamhaus Project / Router / Residential gateway

DNS Record Injection Vulnerabilities in Home Routers Kyle Schomp†, Tom Callahan†, Michael Rabinovich†, Mark Allman†‡ †Case Western Reserve University ‡International Computer Science Institute

Add to Reading List

Source URL: kyle.schomp.info

Language: English - Date: 2016-05-31 23:40:45
UPDATE