Memory work

Results: 235



#Item
91Provinces of the People\'s Republic of China / PTT Bulletin Board System / Albums / Wish / Xiang Zhejun

Welcome BusinessGear App ! 中文 | español | 日本語 --- 3 functions seamlessly work. AND Powerful memory management --- Select the background of the notebook in the file viewer. - You can find the notes from the app

Add to Reading List

Source URL: www.webbanana.org

Language: English - Date: 2014-04-11 01:44:41
92Type theory / Functional languages / Data types / Cross-platform software / ATS / C dynamic memory allocation / Kernel / C / Type system / Computing / Software engineering / Programming language theory

Operating System Development with ATS Work in Progress Matthew Danish Hongwei Xi

Add to Reading List

Source URL: www.cs.bu.edu

Language: English - Date: 2010-01-25 12:25:56
93Software engineering / Abstract data types / Computer memory / Double-ended queue / Threads / Memory barrier / Sequence container / Cilk / Parallel computing / Computing / Computer architecture / Concurrency control

Correct and Efficient Work-Stealing for Weak Memory Models Nhat Minh Lê Antoniu Pop Albert Cohen

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2013-02-19 05:42:00
94Behavior / Crossword / Memory / Human behavior

THEME 5: FIT AGING Hi there, I am Max! I work out every day to stay fit. I swim once a week and go to the gym three times a week.

Add to Reading List

Source URL: www.realchallenge.info

Language: English - Date: 2015-01-07 11:22:27
95Behavior / Crossword / Memory / Human behavior

THEME 5: FIT AGING Hi there, I am Max! I work out every day to stay fit. I swim once a week and go to the gym three times a week.

Add to Reading List

Source URL: realchallenge.info

Language: English - Date: 2015-01-07 11:22:27
96Hashing / Artificial intelligence / Information retrieval / Hash function / Hash table / MD5 / Collision / Provably secure cryptographic hash function / Elliptic curve only hash / Cryptographic hash functions / Cryptography / Search algorithms

Time-memory Trade-offs for Near-collisions Gaëtan Leurent UCL Crypto Group Abstract. In this work we consider generic algorithms to find near-collisions for a hash

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-31 14:07:22
97Reuse / Computer memory / Non-volatile memory

Ecology Efficiency PAPER REUSING SYSTEM — A New Work Style —

Add to Reading List

Source URL: www.toshibatec-ris.com

Language: English - Date: 2014-03-05 02:32:57
98dogs / Bridesmaids / Burglar / Vacuum cleaner / Film / Technology / Kennel

MEMORY JOGGER Need help thinking of people to ask for sponsorship? Make a list of names here and work your way through the list! Parents......................................................

Add to Reading List

Source URL: worldsgreatestshave.com

Language: English - Date: 2014-11-19 23:36:07
99Computer hardware / Abstract data types / Concurrency control / Circular buffer / Memory barrier / Double-ended queue / Parallel Extensions / Queue / Algorithm / Computing / Computer memory / Computer architecture

Fence-Free Work Stealing on Bounded TSO Processors Adam Morrison ∗ Yehuda Afek Computer Science Department

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English
100Computing / Hashing / Mathematics / Applied mathematics / Hash table / Hash function / Parallel computing / Algorithm / Collision / Cryptographic hash functions / Search algorithms / Cryptography

MOMENTUM - A MEMORY-HARD PROOF-OF-WORK VIA FINDING BIRTHDAY COLLISIONS DANIEL LARIMER Invictus Innovations, Inc ABSTRACT. We introduce the concept of memory-hard proof-of-work

Add to Reading List

Source URL: hashcash.org

Language: English - Date: 2014-01-13 13:07:17
UPDATE