Steven Levy

Results: 23



#Item
1

Operating System Implications of Fast, Cheap, Non-Volatile Memory Katelin Bailey Luis Ceze Steven D. Gribble Henry M. Levy University of Washington Department of Computer Science & Engineering

Add to Reading List

Source URL: static.usenix.org

- Date: 2011-04-15 13:57:26
    2

    http://voice.aiga.org/ Imagination on the Couch: An Interview with Francis Levy Written by Steven Heller Published on September 15, 2009.

    Add to Reading List

    Source URL: www.hellerbooks.com

    Language: English - Date: 2010-10-16 18:05:02
      3

      Improving the Reliability of Internet Paths with One-hop Source Routing Krishna P. Gummadi, Harsha V. Madhyastha, Steven D. Gribble, Henry M. Levy, and David Wetherall Department of Computer Science & Engineering Univers

      Add to Reading List

      Source URL: djw.cs.washington.edu

      Language: English - Date: 2005-02-11 22:43:20
        4

        1 Testimony on Bill # January 28, 2015 Paul R. Levy, Center City District Steven Scott Bradley, African American Chamber of Commerce

        Add to Reading List

        Source URL: philadelphiagrowthcoalition.com

        Language: English - Date: 2015-02-22 19:45:38
          5Economics / United Nations / Political corruption / Accountability / Governance / Political philosophy / Good governance / Earth system governance / Earth System Governance Project / Development / Politics / International development

          Policy Brief #3 Integrating Governance into the Sustainable Development Goals Frank Biermann, Casey Stevens, Steven Bernstein, Aarti Gupta, Ngeta Kabiri, Norichika Kanie, Marc Levy, Måns Nilsson, László Pintér,

          Add to Reading List

          Source URL: conferences.asucollegeoflaw.com

          Language: English
          6Academia / Educational technology / Rubric / Teaching / Lesson / Education / Knowledge / Evaluation methods

          Twelve Steps to Beautiful Work Steven Levy, Expeditionary Learning Here are twelve progressive layers of scaffolding that teachers might employ to help students achieve high quality—and beauty—in their work. 1. Assig

          Add to Reading List

          Source URL: www.hightechhigh.org

          Language: English - Date: 2010-10-06 13:45:26
          7Digital media / Random-access memory / Computer data storage / Non-volatile random-access memory / Page cache / Operating system / Non-volatile memory / Solid-state drive / Dynamic random-access memory / Computer memory / Computer hardware / Computing

          Operating System Implications of Fast, Cheap, Non-Volatile Memory Katelin Bailey Luis Ceze Steven D. Gribble Henry M. Levy University of Washington Department of Computer Science & Engineering

          Add to Reading List

          Source URL: homes.cs.washington.edu

          Language: English - Date: 2011-05-12 02:44:15
          8Hacker ethic / Hackers: Heroes of the Computer Revolution / Hacker / What the Hack / Information wants to be free / Hacks at the Massachusetts Institute of Technology / Electron / Steven Levy / Hacker Emblem / Computing / Electronics / Hacking

          How Digital Technology Found Utopian Ideology: Lessons From the First Hackers’ Conference Fred Turner Department of Communication Stanford University Forthcoming in David Silver and Adrienne Massanari, eds., Critical C

          Add to Reading List

          Source URL: fredturner.stanford.edu

          Language: English - Date: 2012-08-02 18:55:52
          9Real property law / Corporate finance / Business / Shareholder rights plan / SEC filings / Takeover / Schedule 13D / Tax / Law / Mergers and acquisitions / Real estate / Real estate investment trust

          EXCESS SHARE PROVISIONS AS TAKEOVER DEFENSES By Steven Seidman, Michael Schwartz, Henry Cohn and Meredith Levy [Messrs. Seidman, Schwartz and Cohn are partners, and Ms. Levy is an associate, at Willkie Farr & Gallagher L

          Add to Reading List

          Source URL: www.willkie.com

          Language: English - Date: 2015-03-05 15:59:28
          10Rogue software / Scareware / Spyware / Computer network security / Kazaa / Keystroke logging / Browser hijacker / Computer virus / WinFixer / Malware / Espionage / System software

          A Crawler-based Study of Spyware on the Web Alexander Moshchuk, Tanya Bragin, Steven D. Gribble, and Henry M. Levy Department of Computer Science & Engineering University of Washington {anm, tbragin, gribble, levy}@cs.wa

          Add to Reading List

          Source URL: www.isoc.org

          Language: English - Date: 2006-02-09 00:38:52
          UPDATE