Computer case

Results: 3867



#Item
281Computer architecture / Computing / Software / Concurrency control / Spinlock / Thread / Linux kernel / System call / Kernel / FreeBSD / Load / Monitor

  Concurrent  systems   Case  study:  FreeBSD  kernel  concurrency  

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2015-09-16 08:03:51
282Tablet computers / Computing / Classes of computers / Computer hardware / IPad / Lexus / Accelerometer / IPad Mini 2

Lexus  iPad  App a  case  study look   around   the   car   while   holding   the   iPad   in   front  of   his   eyes  –  iPad  being  the   window  t

Add to Reading List

Source URL: www.bladepolska.com

Language: English - Date: 2013-10-13 14:10:01
283Sorting algorithms / Mathematics / Analysis of algorithms / Binary heap / Computer science / Heap / Abstraction / Linked list / Merge sort / Big O notation / Best /  worst and average case / Heapsort

March 12, Spring 2008 Quiz 1 Solutions Introduction to Algorithms Massachusetts Institute of Technology

Add to Reading List

Source URL: courses.csail.mit.edu

Language: English - Date: 2009-05-07 21:09:21
284Software / Version control systems / Computer programming / Dimensions CM / PVCS / Rational Application Developer / Version control / Serena Software / Polytron / Comparison of version control software

CASE STUDY RENOWNED BANK MOVES FROM PVCS TO DIMENSIONS CM FOR EVEN FASTER DEVELOPMENT TOP 5 MIGRATION TIPS

Add to Reading List

Source URL: www.serena.com

Language: English - Date: 2013-01-10 16:20:39
285

How Do Developers Use APIs? A Case Study in Concurrency Stefan Blom Faculty of Electrical Engineering, Mathematics and Computer Science University of Twente

Add to Reading List

Source URL: wwwhome.ewi.utwente.nl

Language: English - Date: 2013-04-25 09:57:41
    286Computing / Security engineering / Computer security / Security / Computer network security / Sqrrl / Threat / Cyberwarfare / Cybercrime / E-commerce / Big data / Information security operations center

    DATASHEET SQRRL ENTERPRISE USE CASE: CYBER HUNTING Proactively uncover hidden threats through cyber hunting The days when Security Operations Center analysts could sit back and wait for alerts to come to them have long

    Add to Reading List

    Source URL: sqrrl.com

    Language: English - Date: 2016-02-15 14:44:42
    287Linguistics / Syntax / Language / Grammar / Sentence / Statements / Noun phrase / Noun / Grammatical case / Automatic summarization

    Automatic Extraction of Destinations, Origins and Route Parts from Human Generated Route Directions Xiao Zhang1 , Prasenjit Mitra1,2 , Alexander Klippel3 , and Alan MacEachren3 1 Department of Computer Science and Engin

    Add to Reading List

    Source URL: www.cognitivegiscience.psu.edu

    Language: English - Date: 2010-08-07 22:11:46
    288Law / Copyright law / File sharing / Computer law / United Kingdom copyright law / Copyright / Deep linking / Related rights / EU copyright case-law / Copyright law of the United Kingdom

    REPORT and OPINION on the making available and communication to the public in the internet environment – focus on linking techniques on the Internet ADOPTED UNANIMOUSLY BY THE EXECUTIVE COMMITTEE 16 SEPTEMBER 2013 Exec

    Add to Reading List

    Source URL: www.alai.org

    Language: English - Date: 2014-03-12 09:43:09
    289

    Copyright © 2015 iXsystems, Inc. All rights reserved. CASE STUDY: UNIVERSITY OF FLORIDA Department of Electrical & Computer Engineering Centralized Storage for Research Data

    Add to Reading List

    Source URL: www.ixsystems.com

    Language: English - Date: 2016-01-27 10:35:54
      290

      Musical Composition by Autonomous Robots: A Case Study with AIBO Eduardo R Miranda and Vadim Tikhanoff Computer Music Research Faculty of Technology, University of Plymouth Plymouth, Devon PL4 8AA

      Add to Reading List

      Source URL: cmr.soc.plymouth.ac.uk

      Language: English - Date: 2005-09-19 06:17:18
        UPDATE