G Data

Results: 4547



#Item
611

New TomTom data reveals rush hour traffic doubles journey times for commuters T op 2 5 Wo r s t C o n g e s t e d U r b an i z e d A r e as w i t h in t h e U. S . M a p of t h e M on t h : Ap r i lSeattle

Add to Reading List

Source URL: gis.mtc.ca.gov

Language: English - Date: 2015-05-27 20:04:29
    612Distributed data storage / File sharing / Peer-to-peer / Distributed hash table / Kademlia

    Noname manuscript No. (will be inserted by the editor) Asynchronous Privacy-preserving Iterative Computation on Peer-to-peer Networks J.A.M. Naranjo · L. G. Casado · Márk

    Add to Reading List

    Source URL: www.inf.u-szeged.hu

    Language: English - Date: 2012-08-28 04:30:12
    613

    SAFETY DATA SHEET according to Regulation (EC) NoCutasept G Version 1.1 Revision Date

    Add to Reading List

    Source URL: www.ramanweil.com

    Language: English - Date: 2014-03-10 07:00:33
      614

      Luogo, Data Spett.le Collegio Arbitrale presso la LEGA NAZIONALE DILETTANTI F. I. G. C. c/o Comitato Regionale Lazio L.N.D.

      Add to Reading List

      Source URL: www.assoallenatori.it

      Language: Italian - Date: 2015-08-28 10:14:07
        615

        Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors Hilmi G¨unes¸ Kayacık∗ , Mike Just∗ , Lynne Baillie∗ , David Aspinall† and Nicholas Micallef∗ ∗ Glasg

        Add to Reading List

        Source URL: www.mostconf.org

        Language: English - Date: 2014-05-17 09:17:31
          616

          10 Generalising spatial data and dealing with multiple representations R WEIBEL AND G DUTTON Functions for generalising spatial data are of fundamental importance in GIS because of a variety of requirements for scale-cha

          Add to Reading List

          Source URL: www.geos.ed.ac.uk

          Language: English - Date: 2005-02-04 16:43:54
            617Security / Prevention / Data security / Computer security / Computer network security / Cryptography / National security / NIST Special Publication 800-53 / Security controls / Information security / Personally identifiable information / Internet privacy

            EXECUTIVE OFFICE OF THE PRESIDENT O F F I C E O F M AN AG E M E N T AN D B U D G E T W ASHINGTON, D.CJune 23, 2006 M-06-16

            Add to Reading List

            Source URL: www.whitehouse.gov

            Language: English - Date: 2006-06-26 16:42:04
            618

            Adaptive Data Exchange Model for Opportunistic Systems M.J. Chorley, G.B. Colombo, S.M. Allen, R.M. Whitaker School of Computer Science & Informatics, Cardiff University {m.j.chorley, g.colombo, stuart.m.allen, r.m.whita

            Add to Reading List

            Source URL: martinjc.com

            Language: English - Date: 2011-09-02 07:30:28
              619

              ChipViz: Visualizing Memory Chip Test Data Amit P. Sawanta , Ravi Rainab , and Christopher G. Healeyc a,c North Carolina State University, Department of Computer Science, Raleigh, NC, USA b

              Add to Reading List

              Source URL: www.csc.ncsu.edu

              Language: English - Date: 2008-01-07 00:38:54
                620Machine learning / Learning / Semi-supervised learning / Co-training / Support vector machine / Cross-validation / Supervised learning / Test set

                Researcher Homepage Classification using Unlabeled Data Sujatha Das G.1,3 , Cornelia Caragea1,4 , Prasenjit Mitra1,2,3 , C. Lee Giles1,2,3 1 Computer Science and Engineering Information Sciences and Technology

                Add to Reading List

                Source URL: www2013.wwwconference.org

                Language: English - Date: 2014-07-21 08:47:06
                UPDATE