Computer network operations

Results: 408



#Item
11Pattern Analysis in Social Networks with Dynamic Connections Yu Wu1 and Yu Zhang2 1  Department of Computer Science

Pattern Analysis in Social Networks with Dynamic Connections Yu Wu1 and Yu Zhang2 1 Department of Computer Science

Add to Reading List

Source URL: wayneyuwu.com

Language: English - Date: 2016-07-13 12:24:42
1220th International Conference on Artificial Neural Networks (ICANN), Thessaloniki, Greece, SeptemberEvaluation of Pooling Operations in Convolutional Architectures for Object Recognition Dominik Scherer, Andreas M

20th International Conference on Artificial Neural Networks (ICANN), Thessaloniki, Greece, SeptemberEvaluation of Pooling Operations in Convolutional Architectures for Object Recognition Dominik Scherer, Andreas M

Add to Reading List

Source URL: amueller.github.io

Language: English - Date: 2016-08-04 15:59:56
13An efficient method for performance analysis of high speed networks : modeling and hardware emulation   Cyril Labb´e and Jean-Marc Vincent

An efficient method for performance analysis of high speed networks : modeling and hardware emulation  Cyril Labb´e and Jean-Marc Vincent

Add to Reading List

Source URL: membres-lig.imag.fr

Language: English - Date: 2014-01-09 04:24:30
14Official History of ISD Operations at ODP

Official History of ISD Operations at ODP

Add to Reading List

Source URL: www.odplegacy.org

Language: English - Date: 2014-09-04 08:44:41
15programming pearls THE ENVELOPEIS BACK The February 1984 column was about “back-of-theenvelope” calculations. When you’re deciding whether to add a new command to a database system,

programming pearls THE ENVELOPEIS BACK The February 1984 column was about “back-of-theenvelope” calculations. When you’re deciding whether to add a new command to a database system,

Add to Reading List

Source URL: www.eecs.harvard.edu

Language: English
16Overlays with preferences: Approximation algorithms for matching with preference lists Giorgos Georgiadis Department of Computer Science and Engineering Chalmers University of Technology SG¨oteborg, Sweden

Overlays with preferences: Approximation algorithms for matching with preference lists Giorgos Georgiadis Department of Computer Science and Engineering Chalmers University of Technology SG¨oteborg, Sweden

Add to Reading List

Source URL: www.cse.chalmers.se

Language: English - Date: 2011-05-18 09:50:44
17A Fast TCAD-based Methodology for Variation Analysis of Emerging Nano-Devices Hassan Ghasemzadeh Mohammadi∗ , Pierre-Emmanuel Gaillardon∗ , Majid Yazdani† , Giovanni De Micheli∗ Integrated Systems Laboratory∗ ,

A Fast TCAD-based Methodology for Variation Analysis of Emerging Nano-Devices Hassan Ghasemzadeh Mohammadi∗ , Pierre-Emmanuel Gaillardon∗ , Majid Yazdani† , Giovanni De Micheli∗ Integrated Systems Laboratory∗ ,

Add to Reading List

Source URL: majid.yazdani.me

Language: English - Date: 2015-08-19 06:57:44
18Microsoft PowerPoint - 0_(Warner)_Cyber_Training_Intro_v5.pptx

Microsoft PowerPoint - 0_(Warner)_Cyber_Training_Intro_v5.pptx

Add to Reading List

Source URL: www.dote.osd.mil

Language: English - Date: 2015-06-12 17:08:13
19Local optimality in algebraic path problems (with help from Coq and Ssreflect) Timothy G. Griffin Computer Laboratory University of Cambridge, UK

Local optimality in algebraic path problems (with help from Coq and Ssreflect) Timothy G. Griffin Computer Laboratory University of Cambridge, UK

Add to Reading List

Source URL: www.monmeetings.org

Language: English - Date: 2015-09-04 10:24:56
20RSA ADVANCED SECURITY OPERATIONS CENTER SOLUTION Pervasive Visibility, Rapid Detection, Effective Response OVERVIEW and behavior analysis models to detect and

RSA ADVANCED SECURITY OPERATIONS CENTER SOLUTION Pervasive Visibility, Rapid Detection, Effective Response OVERVIEW and behavior analysis models to detect and

Add to Reading List

Source URL: i.crn.com

Language: English - Date: 2016-06-29 17:01:32