Primitives

Results: 220



#Item
191Section 4: Technical Information Communication (Data) Between the RCX and MicroWorlds EX This section describes how to use the primitives that let you transfer information between MicroWorlds EX and the RCX. Use these te

Section 4: Technical Information Communication (Data) Between the RCX and MicroWorlds EX This section describes how to use the primitives that let you transfer information between MicroWorlds EX and the RCX. Use these te

Add to Reading List

Source URL: www.lcsi.ca

Language: English - Date: 2004-08-23 17:32:09
192Enterprise Architecture based on Design Primitives and Patterns Guidelines for the Design and Development of Event-Trace Descriptions (DoDAF OV-6c)

Enterprise Architecture based on Design Primitives and Patterns Guidelines for the Design and Development of Event-Trace Descriptions (DoDAF OV-6c)

Add to Reading List

Source URL: dodcio.defense.gov

Language: English - Date: 2012-03-10 11:15:29
193TS[removed]V1[removed]Machine-to-Machine communications (M2M); Interoperability Test Specification for CoAP Binding of ETSI M2M Primitives

TS[removed]V1[removed]Machine-to-Machine communications (M2M); Interoperability Test Specification for CoAP Binding of ETSI M2M Primitives

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2013-04-05 11:28:30
194Combining Events And Threads For Scalable Network Services Implementation And Evaluation Of Monadic, Application-level Concurrency Primitives Peng Li  Steve Zdancewic

Combining Events And Threads For Scalable Network Services Implementation And Evaluation Of Monadic, Application-level Concurrency Primitives Peng Li Steve Zdancewic

Add to Reading List

Source URL: fdmanana.files.wordpress.com

Language: English - Date: 2010-06-08 16:04:04
195EN[removed]V2[removed]Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 3: Medium Access Control (MAC) layer

EN[removed]V2[removed]Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 3: Medium Access Control (MAC) layer

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2013-08-26 11:13:51
196Seccia© Basics - 02 Introduction In many languages, data elements are stored as primitives – in other words,

Seccia© Basics - 02 Introduction In many languages, data elements are stored as primitives – in other words,

Add to Reading List

Source URL: www.seccia.org

Language: English - Date: 2010-06-21 13:49:26
197Portfolio of recommended cryptographic primitives NESSIE consortium? February 27, 2003 1

Portfolio of recommended cryptographic primitives NESSIE consortium? February 27, 2003 1

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2003-02-22 15:34:08
198(March 26, [removed]Cryptographic Primitives Paul Garrett [removed]  http://www.math.umn.edu/˜garrett/

(March 26, [removed]Cryptographic Primitives Paul Garrett [removed] http://www.math.umn.edu/˜garrett/

Add to Reading List

Source URL: www.math.umn.edu

Language: English - Date: 2007-03-26 14:27:46
199GPU Primitives  - Case Study: Hair Rendering Ulf Assarsson, Markus Billeter, Ola Olsson, Erik Sintorn  Chalmers University of Technology

GPU Primitives - Case Study: Hair Rendering Ulf Assarsson, Markus Billeter, Ola Olsson, Erik Sintorn Chalmers University of Technology

Add to Reading List

Source URL: s09.idav.ucdavis.edu

Language: English - Date: 2009-08-12 10:53:11
200Autonomous Generation of Grounded Spatial Primitives for Agent Reasoning and Communication Eric G. Berkowitz  Brian E. Mastenbrook

Autonomous Generation of Grounded Spatial Primitives for Agent Reasoning and Communication Eric G. Berkowitz Brian E. Mastenbrook

Add to Reading List

Source URL: brian.mastenbrook.net

Language: English - Date: 2006-02-06 10:34:27