<--- Back to Details
First PageDocument Content
Information science / Information retrieval / Information / Collective intelligence / Computer jargon / Knowledge representation / Reference / Tag / Web 2.0
Date: 2016-02-06 16:20:25
Information science
Information retrieval
Information
Collective intelligence
Computer jargon
Knowledge representation
Reference
Tag
Web 2.0

Add to Reading List

Source URL: www.imiglobal.com

Download Document from Source Website

File Size: 60,39 KB

Share Document on Facebook

Similar Documents

Algebra / Linear algebra / Mathematics / Matrices / Numerical linear algebra / Unitary matrix / Matrix / Rotational symmetry / Four-vector / Permutation matrix / Eigenvalue perturbation / Singular value decomposition

CS378, MA375T, PHY341 Homework 1 Homework 1 Introduction to Quantum Information Science

DocID: 1xVZC - View Document

Algebra / Quantum mechanics / Physics / Quantum information science / Quantum states / Linear algebra / Quantum computing / 0I / Quantum circuit / Eigenvalues and eigenvectors / Qubit / Eigenvalue perturbation

CS378, MA375T, PHY341 Homework 2 Homework 2 Introduction to Quantum Information Science

DocID: 1xVYW - View Document

Health / Medicine / Global health / Epidemiology / Biological weapons / Tropical diseases / Zoonoses / Ebola virus disease / World Health Organization / Pandemic / Public health / Infection

GOV200X – The Politics of Plague Worcester Polytechnic Institute Social Science and Policy Studies Department Sample Syllabus Course Information Professor Patricia Stapleton

DocID: 1xVN2 - View Document

Computing / Free software / Dark web / Internet / Cryptographic protocols / Internet Standards / Computer network security / Tor / .onion / Botnet / Internet privacy / Bipartite graph

HOnions: Detection and Identification of Snooping Tor HSDirs Amirali Sanatinia, Guevara Noubir College of Computer and Information Science Northeastern University, Boston, USA {amirali,noubir}@ccs.neu.edu

DocID: 1xVHD - View Document

Security engineering / Cyberwarfare / Computing / Nadia Heninger / Transport Layer Security / Cryptography / E-commerce / Secure communication / Heninger / Alex Halderman / Association for Computing Machinery / DROWN attack

Shaanan N Cohney , https://cohney.info , Updated 16 September 2018 EDUCATION & WORK PhD Computer and Information Science Computer and Information Security

DocID: 1xVEY - View Document