Natural computing

Results: 1479



#Item
11Extreme Weather Forecasting with Extreme Computing Weather-related natural disasters have, over the last two decades, led to the loss of thousands of lives and caused damage totalling billions of euros each year. Floods,

Extreme Weather Forecasting with Extreme Computing Weather-related natural disasters have, over the last two decades, led to the loss of thousands of lives and caused damage totalling billions of euros each year. Floods,

Add to Reading List

Source URL: www.archer.ac.uk

- Date: 2015-06-03 10:26:10
    12TERN Science Enabling Plan_v1_2013_08_14

    TERN Science Enabling Plan_v1_2013_08_14

    Add to Reading List

    Source URL: www.tern.org.au

    Language: English - Date: 2013-09-05 01:14:37
    13TerraNNI: Natural Neighbor Interpolation on 2D and 3D Grids Using a GPU PANKAJ K. AGARWAL, Duke University ALEX BEUTEL, Carnegie Mellon University THOMAS MØLHAVE, SCALGO USA

    TerraNNI: Natural Neighbor Interpolation on 2D and 3D Grids Using a GPU PANKAJ K. AGARWAL, Duke University ALEX BEUTEL, Carnegie Mellon University THOMAS MØLHAVE, SCALGO USA

    Add to Reading List

    Source URL: alexbeutel.com

    Language: English - Date: 2016-07-05 13:03:24
    14A Natural Language Interface for Querying General and Individual Knowledge (Full Version) Yael Amsterdamer, Anna Kukliansky, and Tova Milo Tel Aviv University

    A Natural Language Interface for Querying General and Individual Knowledge (Full Version) Yael Amsterdamer, Anna Kukliansky, and Tova Milo Tel Aviv University

    Add to Reading List

    Source URL: www.cs.tau.ac.il

    Language: English - Date: 2015-06-14 09:06:09
    15SECURITY The value of data is increasing, but so is the cost of protecting this data. Data stored online is susceptible to compromise and vulnerable to corruption threats. It can be accidental, such as a natural disaster

    SECURITY The value of data is increasing, but so is the cost of protecting this data. Data stored online is susceptible to compromise and vulnerable to corruption threats. It can be accidental, such as a natural disaster

    Add to Reading List

    Source URL: www.lto.org

    Language: English - Date: 2016-02-18 18:42:59
    16Telefonica Research System for the Spoken Web Search task at Mediaeval 2012 Xavier Anguera Telefonica Research Edificio Telefonica - DiagonalBarcelona, Spain

    Telefonica Research System for the Spoken Web Search task at Mediaeval 2012 Xavier Anguera Telefonica Research Edificio Telefonica - DiagonalBarcelona, Spain

    Add to Reading List

    Source URL: ceur-ws.org

    Language: English - Date: 2012-09-25 13:51:20
    17Computing Text Semantic Relatedness using the Contents and Links of a Hypertext Encyclopedia Majid Yazdania,b , Andrei Popescu-Belisa a Idiap Research Institute 1920 Martigny, Switzerland b EPFL, Ecole

    Computing Text Semantic Relatedness using the Contents and Links of a Hypertext Encyclopedia Majid Yazdania,b , Andrei Popescu-Belisa a Idiap Research Institute 1920 Martigny, Switzerland b EPFL, Ecole

    Add to Reading List

    Source URL: majid.yazdani.me

    Language: English - Date: 2015-08-19 06:57:44
    18C HA PT E R 9 Implementing Web Security Using auth-lib.pl OVERVIEW A natural extension of most applications is the capability to restrict or track access through the application. To do this, we need a system

    C HA PT E R 9 Implementing Web Security Using auth-lib.pl OVERVIEW A natural extension of most applications is the capability to restrict or track access through the application. To do this, we need a system

    Add to Reading List

    Source URL: www.extropia.com

    Language: English - Date: 2003-08-09 07:16:17
    19WebLQM: A Web Community Examiner Jesús Ubaldo Quevedo S. H. Stephen Huang  Department of Computer Science

    WebLQM: A Web Community Examiner Jesús Ubaldo Quevedo S. H. Stephen Huang Department of Computer Science

    Add to Reading List

    Source URL: www10.org

    Language: English - Date: 2001-04-19 03:16:42
    20Computing Weighted Solutions in ASP: Representation-Based Method vs. Search-Based Method Duygu C ¸ akmak, Halit Erdo˘gan, and Esra Erdem Faculty of Engineering and Natural Sciences, Sabancı University, Istanbul, Turke

    Computing Weighted Solutions in ASP: Representation-Based Method vs. Search-Based Method Duygu C ¸ akmak, Halit Erdo˘gan, and Esra Erdem Faculty of Engineering and Natural Sciences, Sabancı University, Istanbul, Turke

    Add to Reading List

    Source URL: ceur-ws.org

    Language: English - Date: 2010-05-19 00:29:12