Computer case

Results: 3867



#Item
211Computer memory / Transaction processing / Computer architecture / Concurrency control / Compiler construction / Memory ordering / Consistency model / Cache coherence / Memory barrier / Linearizability / Schedule / Sequential consistency

Review of last lecture  Architecture case studies  Memory performance is often the bottleneck  Parallelism grows with compute performance

Add to Reading List

Source URL: spcl.inf.ethz.ch

Language: English - Date: 2015-10-04 17:36:16
212Kurita Water Industries / Intergraph / Computer-aided design / Geographic information system / Water treatment / Water

CASE STUDY: KURITA WATER, JAPAN FACTS AT A GLANCE Company: Kurita Water Website: www.kurita.co.jp Description: Kurita Water is an advanced

Add to Reading List

Source URL: www.coade.com

Language: English - Date: 2016-07-13 14:51:36
213Computer networking / OpenDaylight Project / Network protocols / Linux Foundation / Emerging technologies / Network architecture / OpenFlow / Open Platform for NFV / Linux / Big Switch Networks / Red Hat / Juniper Networks

CASE STUDY OpenDaylight becomes Industry Standard through Collaborative Development OpenDaylight Background

Add to Reading List

Source URL: www.linuxfoundation.org

Language: English - Date: 2016-07-18 16:20:09
214Emergency management / Disaster preparedness / Humanitarian aid / Occupational safety and health / Computer security / Champaign /  Illinois / In Case of Emergency / Emergency

Medical Reserve Corps Volunteer Application Name Date Home (Street) Address

Add to Reading List

Source URL: www.c-uphd.org

Language: English - Date: 2012-09-11 12:15:39
215Computer security / Vulnerability / Information security / Application security / Threat model / Software development / Software / Threat / Draft:ICT Security Policy System: A Case Study / Mobile security

ISSA ISSA Journal | November 2009 The Global Voice of Information Security

Add to Reading List

Source URL: www.denimgroup.com

Language: English - Date: 2014-01-13 18:22:32
216PERMIS / Computer security

Escape From the Matrix: Lessons from a Case-Study in Access-Control Requirements ∗ [Poster Abstract]

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2009-06-16 07:18:28
217Emerging technologies / Internet of Things / Ambient intelligence / Wind River Systems / Smart city / Computer security / Smart grid / Smart meter

The Intelligence in the Internet of Things INTERNET OF THINGS: SMART BUILDINGS USE CASE • Remote monitoring and control: Building operators and residential consumers will be able to monitor utility consumption and co

Add to Reading List

Source URL: www.windriver.com

Language: English - Date: 2014-04-09 23:14:38
218Software testing / Computer security / Program analysis / Static / Application security / FxCop / FindBugs / Worst-case execution time

Microsoft PowerPoint - DenimGroup_StaticAnalysisTechniquesForTestingApplicationSecurity_Content.pptx

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:18:31
219Applied linguistics / Corpus linguistics / Computational linguistics / Natural language processing / Semantics / Parallel text / Word-sense disambiguation / International Corpus of English / Croatian National Corpus / Terminology extraction / International Computer Archive of Modern and Medieval English / Treebank

Making Monolingual Corpora Comparable: a Case Study of Bulgarian and Croatian Boˇzo Bekavac£ , Petya OsenovaÝ , Kiril SimovÝ , Marko Tadi´c£ £ Institute of Linguistics, Faculty of Philosophy, University of Zagreb

Add to Reading List

Source URL: bultreebank.org

Language: English - Date: 2004-06-01 10:46:40
2203D computer graphics / Manufacturing / Point cloud / Unmanned aerial vehicle / Google Earth / Parrot virtual machine / Surveying

CASE STUDY Using an eBee drone to assess flood damage at one of Europe’s largest mines

Add to Reading List

Source URL: www.sensefly.com

Language: English - Date: 2015-07-09 04:32:33
UPDATE