K computer

Results: 4081



#Item
331Recommender system / Database / K

University of Minnesota Personal vs. Social Mohamed F. Mokbel Department of Computer Science and Engineering University of Minnesota

Add to Reading List

Source URL: persdb10.imis.athena-innovation.gr

Language: English - Date: 2010-09-28 15:54:22
332Chartered Scientist / Royal Society of Chemistry / CSCI

AS Computer Science – PHILOSOPHY: The computer instructor will maintain a learning environment in the classroom modeled after a traditional learning lodge, Kis-ki-no-ah-mah-to-wi-kah-mi-k, where all students are “all

Add to Reading List

Source URL: www.stonechild.edu

Language: English - Date: 2015-09-09 16:32:12
333Continuum mechanics / K-nearest neighbors algorithm / Deformation

2013 IEEE International Conference on Computer Vision Hierarchical Data-driven Descent for Efficient Optimal Deformation Estimation Yuandong Tian Carnegie Mellon University 5000 Forbes Ave, Pittsburgh, PA 15213

Add to Reading List

Source URL: www.utc.ices.cmu.edu

Language: English - Date: 2014-10-10 12:32:26
334Networks / Network theory / Graph theory / Cybernetics / Network science / Community structure

DYNAMICS OF OPINION SPREAD IN SOCIAL NETWORKS BOLESLAW K. SZYMANSKI* G. Korniss, Sameet Sreenivasan, Pramesh Singh, Jierui Xie NETWORK SCIENCE AND TECHNOLOGY CENTER, DEPARTMENT OF COMPUTER SCIENCE, RPI, TROY, NY 12180, U

Add to Reading List

Source URL: ergodic.ugr.es

Language: English - Date: 2014-04-26 04:45:46
335Computer network security / Cryptographic protocols / Wireless networking / Local area networks / IEEE 802.11 / Wi-Fi Protected Access / IEEE 802.11i-2004 / 11i / Orthogonal frequency-division multiplexing / IEEE 802.1X / Broadband / Wpa supplicant

I N T U I C O M BroadBand Solutions 4.9GHzGHz BROADBAND SPECIFICATIONS K E Y F E AT U R E S

Add to Reading List

Source URL: www.econolite.com

Language: English - Date: 2016-02-19 05:24:27
336Computer engineering / Ian Sommerville / University of Engineering and Technology /  Taxila / Systems engineering / Engineering mathematics / Electronic engineering

BOOKS ABOUT KANNAN P RAVIKRISHNAN A ENGINEERING CHEMISTRY Cityhalllosangeles.com KANNAN P RAVIKRISHNAN A...

Add to Reading List

Source URL: k.cityhalllosangeles.com

Language: English - Date: 2015-03-05 01:44:02
337Protein kinases / Signal transduction / Cell signaling / Mitogen-activated Protein Kinases / Mitogen-activated protein kinase / Tyrosine hydroxylase / C-Raf / Phosphorylation / MAPK1

Enhancing the Interoperability of iSimp by Using the BioC Format Yifan Peng, Catalina O. Tudor, Manabu Torii Cathy H. Wu, and K. Vijay-Shanker Computer & Information Sciences University of Delaware

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 2013-10-08 15:16:04
338Multivariate statistics / Linear algebra / Matrix theory / Non-negative matrix factorization / Cluster analysis / Spectral clustering / K-means clustering / Document clustering / Pattern recognition / Expectationmaximization algorithm / Determining the number of clusters in a data set / Hierarchical clustering

SoF: Soft-Cluster Matrix Factorization for Probabilistic Clustering Han Zhao† , Pascal Poupart† , Yongfeng Zhang§ and Martin Lysy‡ † David R. Cheriton School of Computer Science, University of Waterloo, Canada D

Add to Reading List

Source URL: yongfeng.me

Language: English - Date: 2015-03-02 08:17:50
339Data types / Machine learning / B-tree / Ball tree / K-d tree / Binary tree / Tree / Interval tree / Oblivious data structure

Five Balltree Construction Algorithms STEPHEN M. OMOHUNDRO International Computer Science Institute 1947 Center Street, Suite 600 Berkeley, California 94704

Add to Reading List

Source URL: www.geog.ucsb.edu

Language: English - Date: 2013-05-14 18:54:19
340National security / Cybercrime / Hacking / Military technology / Cyberwarfare / Cyberwarfare in the United States / United States Cyber Command / Computer security / MIT Lincoln Laboratory / Cyber-attack / Cyber-Insurance

Cyber Security Research at Lincoln Laboratory Marc A. Zissman and Robert K. Cunningham Department of Defense missions increasingly are fought in and through the cyber domain.

Add to Reading List

Source URL: www.ll.mit.edu

Language: English - Date: 2016-07-12 14:35:26
UPDATE