Computer case

Results: 3867



#Item
111Entertainment / Music / Humanities / Cretan music / Greek dances / Music information retrieval / Music software / Music history / Music of Crete / Makam / Sousta / Ethnomusicology

Two case studies of computer-aided methodology in music research: towards multi-disciplinary approaches to music analysis André Holzapfel ˘ MIAM, ITÜ, and Bogaziçi

Add to Reading List

Source URL: www.rhythmos.org

Language: English - Date: 2015-07-18 06:01:08
112Information science / DVD / Digital media / Media technology / Audio storage / Consumer electronics / Computer storage media / Compact disc / Videotape / Keep case / Videocassette recorder / Optical disc drive

Cites & Insights Crawford at Large Volume 3, Number 11: SeptemberISSN

Add to Reading List

Source URL: citesandinsights.info

Language: English - Date: 2006-07-15 15:54:14
113Internet privacy / World Wide Web / Computing / Software / Hypertext Transfer Protocol / Internet advertising / Computer access control / HTTP cookie / Internet marketing / Web analytics / Ghostery / DoubleClick

The Case for a General and Interaction-based Third-party Cookie Policy Istemi Ekin Akkus1, Nicholas Weaver2 1 Max

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2015-05-11 00:33:43
114Software / Computer-aided design / Design engineering / CAD Overlay / Autodesk / Geographic information system / AutoCAD / Image tracing / 3D graphics software

GTX Case Study GIS Sector Where Paper and CAD Connect™ UNIVERSITY OF MASSACHUSETTS -- DARTMOUTH

Add to Reading List

Source URL: www.gtx.com

Language: English - Date: 2009-09-09 15:52:44
115Software / Computer architecture / System software / Cryptographic software / NetBSD / Berkeley Software Distribution / FreeBSD / OpenBSD / Vi / Linux kernel / OpenSSH / LibreSSL

A Case Study of Cross-System Porting in Forked Projects Baishakhi Ray and Miryung Kim The University of Texas at Austin Austin, TX USA ,

Add to Reading List

Source URL: rayb.info

Language: English - Date: 2016-08-19 22:20:15
116Security / Prevention / Cryptography / Computer law / Signature / National security / EIDAS / Biometrics / Ambient intelligence / Computer security / Information security / Electronic signature

EEMA online April 2015 Issue 7 EEMA Events eID: The business case for the banking and finance community 5 June 2015, Department for Business, Innovation and Skills, London Further to several multi-sector consultation mee

Add to Reading List

Source URL: www.eema.org

Language: English - Date: 2016-05-13 04:17:09
117Economics / Economy / Welfare economics / Development economics / Computer hardware / Poverty threshold / Poverty / Solid-state drive / Extreme poverty

Towards Equal Standards of Welfare Among Populations of Different Subdivision Areas of a Country: A Case Study of Sudan Salih Hamza Abu-El-Yamen (Central Bureau of Statistics-Sudan) Paper prepared for the IARIW-CAPMAS S

Add to Reading List

Source URL: iariw.org

Language: English - Date: 2015-11-12 17:23:01
118Computer icons / Digital badge / Internet culture / Computing / Software / Cyberspace / Badge / Mozilla Open Badges / HASTAC

Open Badges Case Study February 2014 Working Document Providence After School Alliance (PASA)

Add to Reading List

Source URL: www.reconnectlearning.org

Language: English - Date: 2016-03-21 01:37:38
119Computing / Computer architecture / Central processing unit / Computer hardware / Computer arithmetic / Microprocessors / Floating point / Floating-point unit / Fixed-point arithmetic / Embedded system

5e Rencontres Arithmétique de l’Informatique Mathématique (RAIMDijon, 20-22 juin 2012 Synthesis of fixed-point programs based on instruction selection ... the case of polynomial evaluation

Add to Reading List

Source URL: raim2012.u-bourgogne.fr

Language: English - Date: 2012-07-16 09:26:12
120Security / Prevention / E-commerce / Identity documents / Safety / Cybercrime / Password / Online shopping / Credential stuffing / Computer security / Gmail / Identity theft

F500 Retailer Case Study AUTOMATED GIFT CARD FRAUD

Add to Reading List

Source URL: www.shapesecurity.com

Language: English - Date: 2016-08-12 14:49:29
UPDATE