Computer

Results: 301026



#Item
561

Strategies in Dialogues: A Game-Theoretic Approach b , and Katarzyna BUDZYNSKA c,d ´ Magdalena KACPRZAK a , Marcin DZIUBINSKI a Faculty of Computer Science, Białystok University of Technology, Poland

Add to Reading List

Source URL: comma2014.arg.dundee.ac.uk

Language: English - Date: 2014-08-27 11:30:50
    562

    International Journal of Computer Trends and Technology (IJCTT) – Volume 19 Number 2 – JanA Qualitative Study on Perspectives of Retailers about RFID System in Turkey Seda Yıldırım*1 Kenan Aydın**2 *Asst.P

    Add to Reading List

    Source URL: www.ijcttjournal.org

    Language: English - Date: 2015-02-02 10:27:48
      563

      Low Cost Instruction Cache Designs for Tag Comparison Elimination Youtao Zhang Jun Yang Computer Science Department Computer Science and Engineering Department University of Texas at Dallas

      Add to Reading List

      Source URL: people.cs.pitt.edu

      Language: English - Date: 2007-02-07 17:59:45
        564

        Industry Session Call for Papers HPCA 2018 24th IEEE International Symposium on HighPerformance Computer Architecture http://hpca2018.ece.ucsb.edu/ 24 – 28 February 2018 Vienna, Austria

        Add to Reading List

        Source URL: hpca2018.ece.ucsb.edu

        Language: English - Date: 2018-01-02 12:51:09
          565

          Duo: A Wearable System for Learning about Everyday Objects and Actions Charles C. Kemp Massachusetts Institute of Technology Computer Science and Artificial Intelligence Laboratory Cambridge, MA 02139, USA cckemp@csail.m

          Add to Reading List

          Source URL: ckemp.bme.gatech.edu

          Language: English - Date: 2016-04-29 10:36:26
            566

            1 Integrated Approach To Data Center Power Management Lakshmi Ganesh, Hakim Weatherspoon, Tudor Marian, Ken Birman Computer Science Department, Cornell University

            Add to Reading List

            Source URL: fireless.cs.cornell.edu

            Language: English - Date: 2013-05-22 14:11:47
              567

              TECHNISCHE UNIVERSITEIT EINDHOVEN Faculty of Mathematics and Computer Science Exam Cryptology, Wednesday 14 December 2016 Name

              Add to Reading List

              Source URL: www.hyperelliptic.org

              Language: English - Date: 2016-12-14 13:13:52
                568

                Reporting Status of Vulnerability-related Information about Software Products and Websites - 3rd Quarter ofJuly – September) - Information-technology Promotion Agency, Japan (IPA) and Japan Computer Emergency Re

                Add to Reading List

                Source URL: www.ipa.go.jp

                Language: English - Date: 2018-08-07 23:07:26
                  569

                  STUDENT CONCEPTIONS ABOUT THE FIELD OF COMPUTER SCIENCE A Dissertation Presented to The Academic Faculty

                  Add to Reading List

                  Source URL: hewner.com

                  Language: English - Date: 2012-11-05 14:07:05
                    570

                    Improving Bloom filter performance on sequence data using k-mer Bloom filters David Pellow1? , Darya Filippova2 , and Carl Kingsford2?? 1 The Blavatnik School of Computer Science, Tel Aviv University, Tel Aviv 69978, Is

                    Add to Reading List

                    Source URL: cs.tau.ac.il

                    Language: English - Date: 2016-06-27 07:02:39
                      UPDATE