Computer University

Results: 29298



#Item
191

Lecture 16.3 Spark Lineage and Checkpoints ENInstructor: Randal Burns 9 April 2018 Department of Computer Science, Johns Hopkins University

Add to Reading List

Source URL: parallel.cs.jhu.edu

Language: English - Date: 2018-04-30 13:14:16
    192

    VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wananga o te Upoko o te Ika a Maui VUW School of Mathematics, Statistics and Computer Science

    Add to Reading List

    Source URL: homepages.ecs.vuw.ac.nz

    Language: English - Date: 2008-11-16 18:40:13
      193

      Reconstruction of Ancestral Gene Order after Segmental Duplication and Gene Loss Jun Huan1 , Jan Prins1 , Wei Wang1 , Todd Vision2 Departments of 1 Computer Science and 2 Biology University of North Carolina at Chapel Hi

      Add to Reading List

      Source URL: web.cs.ucla.edu

      Language: English - Date: 2003-06-16 23:09:38
        194

        Obfuscating Windows DLLs Bert Abrath, Bart Coppens, Stijn Volckaert, and Bjorn De Sutter Computer Systems Lab Department of Electronics and Information Systems Ghent University, Sint-Pietersnieuwstraat 41, 9000 Gent, Bel

        Add to Reading List

        Source URL: users.elis.ugent.be

        Language: English - Date: 2015-03-15 15:16:33
          195

          High-Speed and Low-Power Multipliers Using the Baugh-Wooley Algorithm and HPM Reduction Tree Magnus Själander and Per Larsson-Edefors Department of Computer Science and Engineering Chalmers University of Technology, SE-

          Add to Reading List

          Source URL: www.sjalander.com

          Language: English - Date: 2012-05-31 04:43:16
            196

            Towards Controllable Story Generation Nanyun Peng Marjan Ghazvininejad Jonathan May Kevin Knight Information Sciences Institute & Computer Science Department University of Southern California {npeng,ghazvini,jonmay,knigh

            Add to Reading List

            Source URL: visionandlanguage.net

            Language: English - Date: 2018-06-02 01:58:32
              197

              What Is Decidable about String Constraints with the ReplaceAll Function TAOLUE CHEN, Birkbeck, University of London, United Kingdom YAN CHEN, State Key Laboratory of Computer Science, Institute of Software, Chinese Acade

              Add to Reading List

              Source URL: www.cs.rhul.ac.uk

              Language: English - Date: 2017-11-14 03:52:19
                198

                Path and View Planning for Underwater Surface Inspection Geoffrey A. Hollinger, Gaurav S. Sukhatme Computer Science Dept. University of Southern California Los Angeles, CAUSA

                Add to Reading List

                Source URL: robotics.usc.edu

                Language: English - Date: 2011-05-25 19:44:40
                  199

                  FaceCept3D: Real Time 3D Face Tracking and Analysis Sergey Tulyakov, Radu-Laurent¸iu Vieriu, Enver Sangineto, Nicu Sebe Department of Information Engineering and Computer Science University of Trento, Italy {sergey.tuly

                  Add to Reading List

                  Source URL: www.ict-acanto.eu

                  Language: English - Date: 2017-06-09 09:32:44
                    200

                    PARIS. DIDEROT UNIVERSITY (Paris 7) GRADUATE SCHOOL OF MATHEMATICAL SCIENCE OF PARIS Ph.D. Computer Science

                    Add to Reading List

                    Source URL: jtristan.github.io

                    Language: English - Date: 2018-06-24 11:22:27
                      UPDATE