Computer data

Results: 44615



#Item
461Computer architecture / Software / System software / Server / Server hardware / Data / Booting / Operating system / Workstation

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYSpringMidterm Exam Answers

Add to Reading List

Source URL: nil.csail.mit.edu

Language: English - Date: 2015-01-05 06:37:34
462Geographic information systems / Computing / Computer hardware / Electronic engineering / Direct memory access / ANTIC

THE EXPLOITATION OF DIGITAL DATA THROUGH ELECTRONIC DISPLAYS Roberta L. Franklin Defense Mapping Agency 8301 Greensboro Drive, Suite 800

Add to Reading List

Source URL: mapcontext.com

Language: English - Date: 2008-08-30 01:29:36
463Software engineering / Computer programming / Computing / Procedural programming languages / Functional languages / Programming language implementation / Data types / Compiler construction / Standard ML / Interpreter / Compiler-compiler / Type system

Hand-Writing Program Generator Generators Lars Birkedal & Morten Welinder DIKU, Department of Computer Science University of Copenhagen DK–2100 Copenhagen Ø, Denmark e-mail: &

Add to Reading List

Source URL: repository.readscheme.org

Language: English - Date: 2010-10-22 08:04:53
464Computer hardware / Computer data storage / Computer memory / Non-volatile memory / Standards organizations / Computing / Computer storage devices / Secure Digital / SD Association / Flash memory / Open NAND Flash Interface Working Group / Memory card

Video Speed Class: The new capture protocol of SD 5.0 White Paper | February 2016 www.sdcard.org | ©2016 SD Association. All rights reserved

Add to Reading List

Source URL: www.sdcard.org

Language: English - Date: 2016-02-23 23:21:49
465Parallel computing / Computing / Computer programming / Algorithmic skeleton / Multi-core processor / Data-intensive computing / General-purpose computing on graphics processing units / Distributed computing / Heterogeneity / Algorithm / Benchmark / Computer cluster

H ETERO PAR ’ 2010 E IGHTH I NTERNATIONAL W ORKSHOP ON A LGORITHMS , M ODELS AND T OOLS FOR PARALLEL C OMPUTING ON H ETEROGENEOUS P LATFORMS

Add to Reading List

Source URL: heteropar2010.ens-lyon.fr

Language: English - Date: 2010-08-27 04:31:07
466Information privacy / Data security / Data protection / Privacy / Law / Glasgow / Data Protection Act / Internet privacy / Computer security / Privacy law / Privacy policy

Glasgow Museums - Kelvingrove Prize Draw Privacy Notice

Add to Reading List

Source URL: www.glasgowlife.org.uk

Language: English - Date: 2016-07-08 12:39:32
467Algebra / Mathematics / Statistical classification / Support vector machine / Valuation / Basis / Constructible universe / Isotope lists /  73-96 / Approximately finite-dimensional C*-algebra

Feature Selection and Classification on Matrix Data: From Large Margins To Small Covering Numbers Sepp Hochreiter and Klaus Obermayer Department of Electrical Engineering and Computer Science

Add to Reading List

Source URL: www.bioinf.jku.at

Language: English - Date: 2011-08-11 02:12:59
468Computing / Computer programming / Data / Data management / Archive formats / Computer file formats / Data corruption / Data quality / Parchive / NetCDF / CNES / Include directive

igdr_gdr_corrupt_CLASS_files

Add to Reading List

Source URL: www.class.ncdc.noaa.gov

Language: English - Date: 2012-03-28 11:25:12
469Statistics / Bioinformatics / Cluster analysis / Data mining / Geostatistics / Hierarchical clustering / Sequence clustering / Computational statistics / Information / Consensus clustering / K-means++

Comparison of Clustering Algorithms in the Context of Software Evolution Jingwei Wu, Ahmed E. Hassan, Richard C. Holt School of Computer Science University of Waterloo Waterloo ON, Canada j25wu,aeehassa,holt@uwaterloo.c

Add to Reading List

Source URL: plg.uwaterloo.ca

Language: English - Date: 2005-07-08 17:27:32
470Computer security / Computing / Data security / Prevention / Security / IT risk management / Information privacy / Payment Card Industry Data Security Standard / Information security / Security controls / Federal Information Security Management Act / Regulatory compliance

Guide to IT Seurity Policies & Standards

Add to Reading List

Source URL: examples.complianceforge.com

Language: English - Date: 2016-07-28 21:17:55
UPDATE