Token

Results: 2997



#Item
881Central processing unit / Compiler optimizations / Hazard / Instruction set / Instruction scheduling / CPU cache / Cycles per instruction / Instruction pipeline / Computer architecture / Computer hardware / Computing

Part C Instruction scheduling Instruction scheduling character stream token stream

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-03-07 06:00:00
882Grammar / Authentication / Access token / Question / Government / Government of India / Unique Identification Authority of India / Security

Standardization Case Study

Add to Reading List

Source URL: standardslearn.org

Language: English - Date: 2014-03-31 09:36:33
883Two-factor authentication / Computer network security / Security token / Password / One-time password / Transaction authentication number / Security / Computer security / Electronic commerce

2FA Risk Awareness Statement 1. What is 2FA? 2FA (also known as two-factor authentication) is the verification of a user’s online identity.

Add to Reading List

Source URL: www.amfraser.com.sg

Language: English - Date: 2015-02-04 22:14:02
884Sun Fire / Sun Enterprise / Solaris / UltraSPARC IV / UltraSPARC III / SPARC / 64-bit / UltraSPARC T1 / Sun Fire 15K / Computer hardware / Sun Microsystems / Computer architecture

Sun FireTM E2900 Server Just the Facts FebruarySunWin token

Add to Reading List

Source URL: www.istoragenetworks.com

Language: English - Date: 2012-01-14 15:34:30
885Sun Fire / Sun Enterprise / UltraSPARC III / Solaris / SPARC / 64-bit / Sun Netra / Logical Domains / Computer hardware / Sun Microsystems / Computer architecture

Netra 440 Server Just the Facts SunWIN token # Notice: This document continues to be restricted to internal usage only because of references to internal web pages. With the removal of these references, selected

Add to Reading List

Source URL: www.istoragenetworks.com

Language: English - Date: 2012-01-12 13:07:30
886Rummy / Thirty-one / Cranium Whoonu / Games / Egyptian Ratscrew / Big Two

Beer War! WINNING CONDITIONS: The player with the highest cumulative ABV played loses the round and receives a token from the player with the lowest cumulative ABV. If a player receives 7 tokens they are out of the game.

Add to Reading List

Source URL: www.blackspotgames.com

Language: English - Date: 2014-05-20 14:38:34
887Formal languages / Software / Parsing / Pattern matching / Compiler / Lexical analysis / Terminal and nonterminal symbols / Attribute grammar / SYNTAX / Programming language implementation / Compiler construction / Software engineering

Jaccie-Tour Tool architecture Token Recognition Grammars and Parsing Attribute Evaluation Getting Started

Add to Reading List

Source URL: www2.cs.unibw.de

Language: English - Date: 2011-10-25 12:09:39
888Public-key cryptography / Cryptographic software / PKCS11 / Electronic commerce / PKCS / Hardware security module / OpenSSL / OpenSC / Security token / Cryptography / Cryptography standards / Smart cards

An introduction to the use of HSM

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:06:51
889Las Vegas Strip / Loyalty program / Marketing / Microeconomics / Pricing / Tropicana Field / Comps / Casino token / Tropicana Las Vegas / Gambling / Entertainment / Gaming

TRO240_NewTropLogo_Ideas5

Add to Reading List

Source URL: www.troplv.com

Language: English - Date: 2014-05-20 20:03:59
890Computational phylogenetics / Sequence alignment / Bitext word alignment / Statistical machine translation / Computational linguistics / Type–token distinction / Artificial intelligence / METEOR / Machine translation / Science / Bioinformatics

Semi-Markov Phrase-based Monolingual Alignment Xuchen Yao and Benjamin Van Durme Johns Hopkins University Baltimore, MD, USA Chris Callison-Burch∗ University of Pennsylvania

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2013-09-19 01:03:16
UPDATE