Enumeration

Results: 726



#Item
51Urban planning / Slum / Urban decay / Urban development / Structure / Enumeration / Toilet / CORC / Community organization / Stellenbosch / Euthenics

Microsoft Word - LANGRUG REPORT 28 JUNE-AK edits.docx

Add to Reading List

Source URL: sasdialliance.org.za

Language: English - Date: 2013-04-13 12:48:55
52Chemistry / Crystallography / Packing problems / Geometry / Physics / Discrete geometry / Spheres / Particle detectors / Sphere packing / Close-packing of equal spheres / Classical nucleation theory / Microstate

PHYSICAL REVIEW E 85, Structure of finite sphere packings via exact enumeration: Implications for colloidal crystal nucleation Robert S. Hoy Department of Mechanical Engineering & Materials Science and Dep

Add to Reading List

Source URL: labs.cas.usf.edu

Language: English - Date: 2012-08-20 18:55:37
53Computer programming / Mathematics / Software engineering / Graph connectivity / Connectivity / Tree traversal / Search algorithms / NP-complete problems / Biconnected component / HopcroftKarp algorithm

Noname manuscript No. (will be inserted by the editor) A portable parallel implementation of the lrs vertex enumeration code David Avis and Gary Roumanis

Add to Reading List

Source URL: cgm.cs.mcgill.ca

Language: English - Date: 2013-11-01 11:17:39
54Security / Cyberwarfare / Computer security / Computer network security / Hacking / Vulnerability / Risk / Common Weakness Enumeration / Vulnerability database / CVSS / National Vulnerability Database / Cross-site scripting

Journal of Communications Vol. 10, No. 2, FebruaryASVC: An Automatic Security Vulnerability Categorization Framework Based on Novel Features of Vulnerability Data Tao Wen1, Yuqing Zhang1,2, Qianru Wu2, and Gang Ya

Add to Reading List

Source URL: www.jocm.us

Language: English - Date: 2015-03-08 23:14:44
55Computing / Cyberwarfare / Security / Computer security / Computer network security / Hacking / Software testing / Common Weakness Enumeration / Vulnerability database / Attack / Common Vulnerabilities and Exposures / Architecture tradeoff analysis method

Architectural Analysis for Security (AAFS)

Add to Reading List

Source URL: resources.sei.cmu.edu

Language: English - Date: 2015-05-01 17:51:11
56Ntuzuma / Enumeration / Community

ISN TECHNICAL TEAM EXCHANGE TO KZN DATES 26th August - 1st September 2011 Four ISN technical team members from WC and Gauteng provinces were in attendance, including Blessing (Coordinator of enumerations and GIS special

Add to Reading List

Source URL: sasdialliance.org.za

Language: English - Date: 2013-04-13 12:48:24
57Geography of the United States / Confederate States of America / Gulf Coast of the United States / Kemper County /  Mississippi / Mississippi

1880 Kemper County Enumeration Districts District 4, Kellis Store Census District of District 4, Kellis Store, Kemper County Mississippi Source - FHL FilmNational

Add to Reading List

Source URL: www.kemper.msgen.info

Language: English - Date: 2016-03-15 18:20:03
58United States Census / Nationality law / Genealogy / Demography / Human geography / Government / Census / Survey methodology / Enumeration / Canadian nationality law / Naturalization

PDF Document

Add to Reading List

Source URL: helpdesk.rootsweb.ancestry.com

Language: English - Date: 2004-07-16 10:06:04
59Mathematics / Geometry / Combinatorics / Enumerative combinatorics / David Avis / Logic form / Vertex enumeration problem

plrs: Portable Parallel Implementation of the lrs Vertex Enumeration Code David Avis Kyoto University January 30, 2015

Add to Reading List

Source URL: cgm.cs.mcgill.ca

Language: English - Date: 2015-03-30 01:28:16
UPDATE