Computer Laboratory

Results: 4525



#Item
581

Safe Cross-Language Inheritance Kathryn E. Gray Computer Laboratory, University of Cambridge, UK Abstract. Inheritance is a standard means for reuse and for interfacing

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-05-01 17:52:19
    582Planning / Real-time computing / Operations research / Scheduling / Criticality / Real-time operating system / Multi-core processor / Critical / Mixed criticality

    Institut für Technische Informatik und Kommunikationsnetze Computer Engineering and Networks Laboratory Prof. L. Thiele

    Add to Reading List

    Source URL: www.tik.ee.ethz.ch

    Language: English - Date: 2015-05-18 12:15:52
    583

    Incremental Text Structuring with Online Hierarchical Ranking Erdong Chen, Benjamin Snyder and Regina Barzilay Computer Science and Artificial Intelligence Laboratory Massachusetts Institute of Technology {edc,bsnyder,r

    Add to Reading List

    Source URL: pages.cs.wisc.edu

    Language: English - Date: 2007-05-19 21:15:37
      584Graph theory / Mathematics / Distributed data storage / Computational complexity theory / Selection algorithm / Randomized algorithm / Network theory / Networks / Koorde / Kademlia

      Brief Announcement: Information Dissemination on Multiple Channels Stephan Holzer1 , Yvonne-Anne Pignolet2 , Jasmin Smula1 , Roger Wattenhofer1 1 Computer Eng. and Networks Laboratory (TIK), ETH Zurich, Switzerland

      Add to Reading List

      Source URL: www.tik.ee.ethz.ch

      Language: English - Date: 2015-05-18 12:16:38
      585

      Machine Reading Using Markov Logic Networks for Collective Probabilistic Inference Shalini Ghosh, Natarajan Shankar, Sam Owre Computer Sciences Laboratory, SRI International Abstract. DARPA’s Machine Reading project i

      Add to Reading List

      Source URL: www.csl.sri.com

      Language: English - Date: 2013-07-21 01:47:08
        586Cryptography / Data Encryption Standard / Format-preserving encryption / Block cipher modes of operation / Block cipher / Triple DES / Feistel cipher / Advanced Encryption Standard / Cipher / Symmetric-key algorithm / CCM mode

        ITL BULLETIN FOR APRIL 2016 NEW NIST SECURITY STANDARD CAN PROTECT CREDIT CARDS, HEALTH INFORMATION Morris Dworkin, Larry Feldman, 1 and Greg Witte,1 Editors Computer Security Division Information Technology Laboratory N

        Add to Reading List

        Source URL: csrc.nist.gov

        Language: English - Date: 2016-04-14 13:47:17
        587Linux Foundation / University of Cambridge Computer Laboratory / Xen / IBM / HRL

        Impressions from the 2006 USENIX Annual Technical Conference Muli Ben-Yehuda

        Add to Reading List

        Source URL: www.mulix.org

        Language: English - Date: 2016-06-16 09:04:09
        588

        Protean Code: Achieving Near-free Online Code Transformations for Warehouse Scale Computers Michael A. Laurenzano, Yunqi Zhang, Lingjia Tang, Jason Mars Advanced Computer Architecture Laboratory, University of Michigan -

        Add to Reading List

        Source URL: web.eecs.umich.edu

        Language: English - Date: 2016-06-14 14:16:27
          589

          QUANTUM CRYPTOGRAPHY WITH FEMTOSECOND PARAMETRIC DOWN CONVERSION A. V. Sergienko, M. Atature, B. M. Jost, J. Perina Jr., B. E. A. Saleh, and M. C. Teich Quantum Imaging Laboratory Department of Electrical and Computer En

          Add to Reading List

          Source URL: people.bu.edu

          Language: English - Date: 2000-05-01 17:43:40
            590

            Optimistic Shared Memory Dependence Tracing Yanyan Jiang∗ , Du Li† , Chang Xu∗‡ , Xiaoxing Ma∗‡ , Jian Lu∗ ∗ State Key Laboratory for Novel Software Technology, Nanjing University Department of Computer S

            Add to Reading List

            Source URL: cs.nju.edu.cn

            Language: English - Date: 2016-05-06 10:15:53
              UPDATE