Architecture Analysis

Results: 1991



#Item
141

A Methodology for Requirements Analysis of AI Architecture Authoring Tools

Add to Reading List

Source URL: fdg2014.org

Language: English - Date: 2014-04-16 19:58:18
    142

    A Methodology for Requirements Analysis of AI Architecture Authoring Tools

    Add to Reading List

    Source URL: www.fdg2014.org

    Language: English - Date: 2014-04-16 19:58:18
      143Artificial intelligence / Behavioural sciences / Kristinn R. Thrisson / Cybernetics / Cognitive science / Constructionist design methodology / Cognitive architecture / Artificial general intelligence / Agent-based model / Intelligent agent / Cognition

      Achieving Artificial General Intelligence Through Peewee Granularity Kristinn R. Thórisson & Eric Nivel Center for the Analysis and Design of Intelligent Agents / School of Computer Science Reykjavik University, Kringlu

      Add to Reading List

      Source URL: xenia.media.mit.edu

      Language: English - Date: 2009-04-20 17:12:53
      144Computing / Concurrent computing / Software engineering / Parallel computing / Type theory / Data types / Distributed computing architecture / Benchmark / Type system / Type inference / Consistency model / Shared memory

      Data Sharing Analysis for Titanium Ben Liblit liblit@ cs. berkeley. edu Alex Aiken

      Add to Reading List

      Source URL: titanium.cs.berkeley.edu

      Language: English - Date: 2014-04-29 06:11:56
      145Domain name system / Computing / Internet / Network architecture / Domain Name System Security Extensions / Name server / Root name server / PowerDNS / OpenDNS / Reverse DNS lookup / DNS root zone / Domain name

      Master in System and Network Engineering Analysis of DNS Resolver Performance Measurements Supervisors: Yuri Schaeffer

      Add to Reading List

      Source URL: www.nlnetlabs.nl

      Language: English - Date: 2015-08-24 06:37:35
      146Architecture tradeoff analysis method / Enterprise architecture / Software architecture / Height

      Two Hands Are Better Than One (up to constant factors): Self-Assembly In The 2HAM vs. aTAM Sarah Cannon∗1 , Erik D. Demaine†2 , Martin L. Demaine‡3 , Sarah Eisenstat§4 , Matthew J. Patitz¶5 , Robert T. Schwellerk

      Add to Reading List

      Source URL: drops.dagstuhl.de

      Language: English - Date: 2013-02-18 07:03:05
      147

      UI Designer UI Designers are responsible for the 5 stages of The Wonderfactory’s UI Process; Research/Standards, Information Architecture, UI Design, Documentation, and Testing/Analysis. UI Designers are also responsi

      Add to Reading List

      Source URL: thewonderfactory.com

      Language: English
        148

        Multi-architecture Value Analysis for Machine Code H. Cassé, IRIT, université de Toulouse WCET, June, 9th 2013, Paris WCET: SEmantics, Precision and

        Add to Reading List

        Source URL: wcet2013.imag.fr

        Language: English - Date: 2013-07-22 05:15:38
          149Computing / Internet / Network architecture / Internet protocols / Secure communication / Dark web / Internet security / Tor / Onion routing / Traffic analysis / Proxy server / Transmission Control Protocol

          Low-Cost Traffic Analysis of Tor Steven J. Murdoch and George Danezis University of Cambridge, Computer Laboratory 15 JJ Thomson Avenue, Cambridge CB3 0FD United Kingdom {Steven.Murdoch,George.Danezis}@cl.cam.ac.uk

          Add to Reading List

          Source URL: www0.cs.ucl.ac.uk

          Language: English - Date: 2013-10-10 06:49:00
          150

          An Architecture for Inline Anomaly Detection Tammo Krueger, Christian Gehl, Konrad Rieck and Pavel Laskov ∗ Fraunhofer Institute FIRST Intelligent Data Analysis, Berlin, Germany {krutam,gehl,rieck,laskov}@first.fraunho

          Add to Reading List

          Source URL: www-rsec.cs.uni-tuebingen.de

          Language: English - Date: 2010-03-31 05:12:25
            UPDATE