Computer Applications

Results: 4069



#Item
121Operations research / Convex optimization / Mathematical optimization / Linear programming / Mathematics / Applied mathematics / Computer science

Energy minimization via moment hierarchies David de Laat (TU Delft) ESI Workshop on Optimal Point Configurations and Applications 16 October 2014

Add to Reading List

Source URL: www.daviddelaat.nl

Language: English
122Computer architecture / Classes of computers / Computing / Embedded systems / Embedded Linux / Linux-based devices / Single-board computers / Motherboard / Gumstix / Computer-on-module / Texas Instruments DaVinci / Linux kernel

Gumstix Announces IceSTORM Computer­on­Module  Drives embedded graphics applications in demanding, rugged environments    ® ​ REDWOOD CITY, Calif., July 21, 2015 ​

Add to Reading List

Source URL: www.gumstix.com

Language: English - Date: 2015-07-22 02:13:56
123Computational linguistics / Information science / Artificial intelligence applications / Applied linguistics / Artificial intelligence / Natural language processing / Computer-assisted translation / Project management / Question answering / Machine translation / Deliverable / Evaluation

quality translation by deep language engineering approaches

Add to Reading List

Source URL: www.di.fc.ul.pt

Language: English - Date: 2016-05-03 11:49:22
124Software engineering / Computability theory / Object-oriented programming / Polymorphism / Subtyping / Type theory / Theoretical computer science / Characteristic function / Lambda calculus / Computing

Characteristic Formulae for Session Types Julien Lange and Nobuko Yoshida Imperial College London Abstract. Subtyping is a crucial ingredient of session type theory and its applications, notably to programming language i

Add to Reading List

Source URL: mrg.doc.ic.ac.uk

Language: English - Date: 2016-08-22 17:55:56
125Medical imaging / Mathematics / Computer vision / Multivariable calculus / Partial differential equation / Algorithm / Differential equation / Inverse problem / Image registration / Computational engineering / Academia

IMETUM Lecture Series Workshop-Series IMETUM Lecture Optimal Control Meets Medical Imaging Sciences: Applications, Formulations and Fast Solvers March 5, 2015 I30pm

Add to Reading List

Source URL: users.ices.utexas.edu

Language: English - Date: 2016-08-16 23:26:38
126Business / Technology / Manufacturing / Metalworking / Lathes / Computer-aided engineering / Encodings / G-code / Metal lathe / FANUC / Machinist / Short Message Service

Skilled Trade SMS Technical Services LLC, in Osceola, Arkansas is currently accepting applications for the full time position of: Manual Machinist Qualified applicant must perform the full range of journeyman machinist t

Add to Reading List

Source URL: www.anc.edu

Language: English - Date: 2016-08-02 10:35:10
127Computing / Technology / Humancomputer interaction / Usability / Technical communication / Software / Design / Graphic design / User interface design / User interface / End user / Computer security

Three Challenges for Embedding Security into Applications Rebecca E. Grinter and D. K. Smetters Palo Alto Research Center (PARCCoyote Hill Road Palo Alto, CAUSA

Add to Reading List

Source URL: www.andrewpatrick.ca

Language: English - Date: 2003-01-17 16:30:14
128Classes of computers / Computing / Computer hardware / Embedded systems / Embedded Linux / Linux-based devices / Single-board computers / Motherboard / Gumstix / Computer-on-module / Computing platform / Overo

  GUMSTIX ANNOUNCES OVERO STORM­P COMs  Faster wireless communications expands the potential for innovative applications      REDWOOD CITY, Calif. —July 23, 2014   

Add to Reading List

Source URL: www.gumstix.com

Language: English - Date: 2014-07-24 17:21:47
129Computing / Cloud computing / Cloud infrastructure / Cloud research / Grid computing / Personal cloud / Utility computing / Green computing / Software as a service / HP Cloud / Cloud computing architecture

International Journal of Computer Applications (0975 – 8887) Volume 113 – No. 3, March 2015 Recent Trends towards Green Clouds by using Fuzzy based Live Migration Amrinder Kaur

Add to Reading List

Source URL: research.ijcaonline.org

Language: English - Date: 2015-03-10 07:55:41
130Security / Computer security / Cyberwarfare / Computer network security / Web applications / Cryptography / Secure communication / Vulnerability / Web application firewall / Application security / Application firewall

The Increasing Risk to Enterprise Applications Sponsored by Prevoty Independently conducted by Ponemon Institute LLC Publication Date: November 2015

Add to Reading List

Source URL: prevoty.com

Language: English - Date: 2016-08-18 22:09:36
UPDATE