Computer Applications

Results: 4069



#Item
591

A Model-Based Workflow Approach for Scientific Applications Leonardo Salayandía, Paulo Pinheiro da Silva, Ann Q. Gates, Alvaro Rebellon The University of Texas at El Paso, Computer Science, El Paso, TX, 79902, USA {leon

Add to Reading List

Source URL: www.cs.utep.edu

Language: English - Date: 2006-08-11 12:41:21
    592

    BRICS Basic Research in Computer Science BRICS RSU. Kohlenbach: Some Logical Metatheorems with Applications in Functional Analysis Some Logical Metatheorems with

    Add to Reading List

    Source URL: www.brics.dk

    Language: English - Date: 2003-05-19 09:31:34
      593

          Probationary Tenure Track Assistant Professor position in the Faculty of Computer Science Dalhousie University (http://www.dal.ca) invites applications for a Probationary Tenure Track position at the Assistant P

      Add to Reading List

      Source URL: www.cs.dal.ca

      Language: English - Date: 2015-04-10 11:01:23
        594

        Gabor Features in Image Analysis Joni-Kristian Kamarainen Machine Vision and Pattern Recognition Laboratory, Lappeenranta University of Technology (LUT Kouvola) Abstract—In applications of computer vision and image ana

        Add to Reading List

        Source URL: personal.lut.fi

        Language: English - Date: 2012-09-19 03:45:03
          595

          Multiresolution Applications in Computer Graphics: Curves, Images, and Video by Adam Finkelstein A dissertation submitted in partial fulfillment of

          Add to Reading List

          Source URL: grail.cs.washington.edu

          Language: English - Date: 2000-08-11 02:48:30
            596

            To appear in: Unusual Applications of Number Theory, M. Nathanson, ed., DIMACS Series in Discrete Mathematics and Theoretical Computer Science, 2002. Random walks with badly approximable numbers Doug Hensley and Francis

            Add to Reading List

            Source URL: www.math.hmc.edu

            Language: English - Date: 2001-08-06 16:29:50
              597

              Finding Security Vulnerabilities in Java Applications with Static Analysis Benjamin Livshits and Monica S. Lam Computer Science Department

              Add to Reading List

              Source URL: www.memoryatwork.org

              Language: English - Date: 2010-12-06 08:20:02
                598

                Microscopy: Science, Technology, Applications and Education A. Méndez-Vilas and J. Díaz (Eds.) ______________________________________________ A computer-aided light microscopy system for three-dimensional reconstructio

                Add to Reading List

                Source URL: www.formatex.info

                Language: English - Date: 2011-02-10 08:43:53
                  599

                  Spinning Beach Ball Laptop is unresponsive and the "spinning beach ball" causes the computer to slow or become unresponsive try Force Quitting applications until the spinning beach ball goes away. Force Quitting can be d

                  Add to Reading List

                  Source URL: fc.dc-grimes.k12.ia.us

                  Language: English - Date: 2012-05-10 09:37:43
                    600

                    Isolation problem for Web Mashups Formal definition of Capability Safe languages Solving the Isolation problem using Capabilit Object Capabilities and Isolation of Untrusted Web Applications Ankur Taly Dept. of Computer

                    Add to Reading List

                    Source URL: oakland10.cs.virginia.edu

                    Language: English - Date: 2010-05-19 18:16:06
                      UPDATE