Back to Results
First PageMeta Content
SCIgen / Ambient intelligence / Knowledge / Science / Academia / Actor model / Concurrent computing


The Influence of Symbiotic Archetypes on Oportunistically Mutually Exclusive Hardware and Architecture Ike Antkare International Institute of Technology United Slates of Earth [removed]
Add to Reading List

Document Date: 2014-01-09 04:24:28


Open Document

File Size: 121,80 KB

Share Result on Facebook

Company

IBM / M. Zhao / Nintendo / Oportunistically Mutually Exclusive Hardware / Microsoft / Architecture Ike Antkare International / /

/

Facility

Architecture Ike Antkare International Institute of Technology United Slates / /

IndustryTerm

Internet access / software engineering / eventdriven algorithms / web browsers / information retrieval systems / neural networks / 1000node network / software components / file systems / e - business / islational technology / Internet cluster / peer-topeer technology / expert systems / Wireless Models / energy / Internet wearable / heterogeneous technology / active networks / stable software / pseudorandom algorithms / sensor networks / wide-area networks / telephony using unstable algorithms / probabilistic algorithms / low-energy models / e-voting technology / homogeneous algorithms / web browsers Internet / infamous authenticated algorithm / real-time models / commodity operating systems / Low-energy / a* search / mesh networks / Web services / /

OperatingSystem

Minix / NetBSD / DoS / BSD / /

Organization

MIT / UC Berkeley / Architecture Ike Antkare International Institute of Technology United Slates of Earth Ike.Antkare@iit.use Abstract / UCSD / KGB / /

Person

Ike Antkare / John Hennessy / /

/

ProgrammingLanguage

XML / /

Technology

IPv6 / XML / islational technology / private key / operating systems / RAID / PDF / encryption / Ethernet / Signed / Electronic Algorithms / pseudorandom algorithms / Bayesian / Ubiquitous Technology / DNS / artificial intelligence / Replicated / Metamorphic Algorithms / peer-topeer technology / Data Mining / e-voting technology / infamous authenticated algorithm / IPv4 / eventdriven algorithms / gigabit / simulation / Controlling telephony using unstable algorithms / flash / /

SocialTag