Computer systems

Results: 26232



#Item
211

1 Call Graph Profiling for Multi Agent Systems Dinh Doan Van Bien, David Lillis and Rem W. Collier School of Computer Science and Informatics University College Dublin

Add to Reading List

Source URL: ceur-ws.org

- Date: 2009-07-25 13:52:00
    212

    Performance Analysis of Content Matching Intrusion Detection Systems S. Antonatos, K. G. Anagnostakis†, E. P. Markatos , M. Polychronakis∗  † Institute of Computer Science

    Add to Reading List

    Source URL: dcs.ics.forth.gr

    - Date: 2012-03-22 09:28:01
      213

      Storage Systems for Storage-Class Memory Haris Volos, Michael Swift Execution time (s) Computer Sciences Department, University of Wisconsin–Madison

      Add to Reading List

      Source URL: pages.cs.wisc.edu

      - Date: 2015-07-23 11:03:47
        214

        Assessing Energy Efficiency of Fault Tolerance Protocols for HPC Systems Esteban Meneses, Osman Sarood and Laxmikant V. Kal´e Department of Computer Science University of Illinois at Urbana-Champaign Urbana, Illinois, 6

        Add to Reading List

        Source URL: charm.cs.illinois.edu

        - Date: 2012-09-06 16:11:39
          215

          NorthWest Arkansas Community College Associate of Applied Science – Computer Information Systems - Computer Programming 2016 Degree Plan Student Name: Student ID #:

          Add to Reading List

          Source URL: content.nwacc.edu

          - Date: 2016-09-30 16:35:15
            216

            Transfer Planning GuideMajor in Computer Information Systems/ Bachelor of Business Administration (BBA) 120 Credit Hours Texas Education Code Sectionrequires that Texas public institutions facilitate t

            Add to Reading List

            Source URL: gato-docs.its.txstate.edu

            - Date: 2016-09-22 16:54:22
              217

              BAChELOr OF SCIENCE Positions in the computer industry include job opportunities in the areas of hardware manufacturing, soware development, information systems design and maintenance,

              Add to Reading List

              Source URL: www.miles.edu

              - Date: 2013-04-10 19:24:50
                218

                Preventing emerging threats with Kaspersky System Watcher Kaspersky Lab Today’s computer systems are better than ever at multitasking. They can run numerous

                Add to Reading List

                Source URL: www.antivirus.lv

                - Date: 2015-01-29 17:33:46
                  219

                  (Put up on the request of IEEE Circuits & Systems (CAS) Society) Venue: Samapnaturi Campus, IIT Bhubaneswar An Outreach Activity of IEEE Circuits & Systems (CAS) Society Coordinator: Dr. Pramod Meher, School of Computer

                  Add to Reading List

                  Source URL: www.iitbbs.ac.in

                  - Date: 2015-11-25 00:22:09
                    220

                    Belief Contraction for the Description Logic EL Zhi Qiang Zhuang and Maurice Pagnucco ARC Centre of Excellence for Autonomous Systems and National ICT Australia, School of Computer Science and Engineering, The University

                    Add to Reading List

                    Source URL: ceur-ws.org

                    - Date: 2009-07-07 04:46:34
                      UPDATE