Generating

Results: 6174



#Item
971Food and drink / Bourbon whiskey / Whisky / Irish whiskey / Distilled Spirits Council of the United States

Irish Whiskey: The Emerald Spirit In 2014, over 2.7 million 9-liter cases of Irish Whiskey were sold in the United States, generating $553 million in revenues for distillers. Year

Add to Reading List

Source URL: www.discus.org

Language: English - Date: 2015-02-27 16:47:56
972Bioengineering / Genetics / RNA / Transcriptome / Promoter / Bioinformatics / Gene / Biology / Molecular biology / Gene expression

Project Title: Generating “live” gene expression tools for use in algal molecular manipulation Project Number

Add to Reading List

Source URL: www.iitbmonash.org

Language: English - Date: 2013-07-16 03:35:37
973Combinatorics / Equivalence of categories / Category / Enumeration / Graph theory / Mathematics / Adjoint functors / Enumerative combinatorics

Generating Combinatorial Objects without Isomorphs Brendan D. McKay Department of Computer Science Australian National University Canberra, ACT, 0200

Add to Reading List

Source URL: www.math.sinica.edu.tw

Language: English - Date: 2003-10-08 02:41:27
974Pollution / Aquifers / Hydrology / Environmental chemistry / Groundwater / Liquid water / Soil contamination / Risk assessment / Soil / Environment / Water / Earth

EXECUTIVE SUMMARY Maine Yankee is a former nuclear power electrical generating plant that, since ceasing generating electricity in August 1997, is being decommissioned and dismantled. This Resource Conservation and Recov

Add to Reading List

Source URL: www.maineyankee.com

Language: English - Date: 2010-03-11 11:17:13
975Generating Availability Data System / Port / U.S. Customs and Border Protection / International relations / Political geography / National security / Customs services / Customs / International law

ICS Outage Report – Tuesday 31 January 2012

Add to Reading List

Source URL: cargosupport.gov.au

Language: English - Date: 2012-02-01 00:11:51
976Method / Object-oriented programming / Java programming language / Code refactoring / Polymorphism / Java / Push Down / Method overriding / Constructor / Computing / Computer programming / Software engineering

Tutorial 02: Writing Source Code Contents: 1. Generating a constructor. 2. Generating getters and setters. 3. Renaming a method. 4. Extracting a superclass.

Add to Reading List

Source URL: www.accs.uq.edu.au

Language: English - Date: 2013-12-01 22:19:28
977Evaluation strategy / Incremental computing / Partial evaluation / Compiler construction / Interpreter / Eval / Computer program / Self-interpreter / Compiler / Software engineering / Computing / Programming language implementation

Generating Optimizing Specializers Robert Gl¨ uck∗ Jesper Jørgensen

Add to Reading List

Source URL: repository.readscheme.org

Language: English - Date: 2010-10-22 08:04:50
978Grammar / Morphology / Morpheme / Lexicon / Inflection / Parsing / Word stem / Speech recognition / Derivational morphology / Linguistics / Linguistic morphology / Computational linguistics

INTERSPEECHOn Generating Combilex Pronunciations via Morphological Analysis Korin Richmond, Robert Clark, Sue Fitt Centre for Speech Technology Research, Edinburgh University, United Kingdom , r

Add to Reading List

Source URL: www.cstr.ed.ac.uk

Language: English - Date: 2010-11-09 07:30:24
979Natural language processing / Computer arithmetic / Artificial intelligence / Information extraction / 0 / Full text search / Search engine indexing / Pi / Anno Domini / Information science / Information retrieval / Searching

Methods of Extracting Year References for Chronological-table-generating Text Searching Yasusi Kanada Central Research Laboratory, Hitachi Ltd. Higashi-Koigakubo 1-280, Kokubunji, Tokyo 185, Japan E-mail:

Add to Reading List

Source URL: www.kanadas.com

Language: English - Date: 1999-08-17 04:03:21
980Cyberoam / Software appliances / Security appliance / Virtual security appliance / Application firewall / Hypervisor / Computer networking / Virtualization / Hyper-V / System software / Software / Virtual machines

Security in Virtual Data Center S e c u r i n g Yo u A growing business faces increasing demand for consumption of IT resources. The IT teams are constantly under pressure for generating more

Add to Reading List

Source URL: cyberoam-la.com

Language: English - Date: 2013-02-19 20:27:33
UPDATE