Persistent Systems

Results: 149



#Item
1Persistent Memory for Artificial Intelligence Bill Gervasi Principal Systems Architect  Santa Clara, CA

Persistent Memory for Artificial Intelligence Bill Gervasi Principal Systems Architect Santa Clara, CA

Add to Reading List

Source URL: nantero.com

Language: English - Date: 2018-08-27 11:48:39
2GPU I/O persistent kernel for latency bound systems

GPU I/O persistent kernel for latency bound systems

Add to Reading List

Source URL: www.hpdc.org

Language: English - Date: 2017-07-18 15:38:19
    3arXiv:0908.1271v1 [cond-mat.stat-mech] 10 AugDiffusion coefficients for multi-step persistent random walks on lattices Thomas Gilbert†, David P. Sanders‡ †Center for Nonlinear Phenomena and Complex Systems,

    arXiv:0908.1271v1 [cond-mat.stat-mech] 10 AugDiffusion coefficients for multi-step persistent random walks on lattices Thomas Gilbert†, David P. Sanders‡ †Center for Nonlinear Phenomena and Complex Systems,

    Add to Reading List

    Source URL: sistemas.fciencias.unam.mx

    Language: English - Date: 2011-03-31 15:05:12
      4Bat UAS™ Family of Multi-Mission, Persistent and Affordable Tactical Unmanned Aircraft Systems  Bat UAS™

      Bat UAS™ Family of Multi-Mission, Persistent and Affordable Tactical Unmanned Aircraft Systems Bat UAS™

      Add to Reading List

      Source URL: www.northropgrumman.com

      - Date: 2018-02-06 19:15:16
        5The Parametrisation Method for Invariant Manifolds of Tori in Skew-Product Systems with Spatial Decay in Lattices and An Entire Transcendental Family with a Persistent Siegel Disk Rubén Berenguel

        The Parametrisation Method for Invariant Manifolds of Tori in Skew-Product Systems with Spatial Decay in Lattices and An Entire Transcendental Family with a Persistent Siegel Disk Rubén Berenguel

        Add to Reading List

        Source URL: www.maia.ub.es

        - Date: 2016-02-26 13:07:02
          6T2 SPEAR PHISHING PROTECTION  T2 Analysis & Mitigation Disrupt spear phishing attacks before systems and data are compromised. Spear phishing is the most prevalent and successful tactic used in advanced targeted attacks.

          T2 SPEAR PHISHING PROTECTION T2 Analysis & Mitigation Disrupt spear phishing attacks before systems and data are compromised. Spear phishing is the most prevalent and successful tactic used in advanced targeted attacks.

          Add to Reading List

          Source URL: pages.phishlabs.com

          Language: English - Date: 2016-08-11 09:01:38
          7Restoration of a Rare Image Collection Through the SDSC/UMD/NARA Prototype Persistent Archive

          Restoration of a Rare Image Collection Through the SDSC/UMD/NARA Prototype Persistent Archive

          Add to Reading List

          Source URL: wiki.umiacs.umd.edu

          Language: English - Date: 2008-09-10 19:13:34
          8Alexander Kiel University Leipzig HAL8 PaperD AT O M I C - A F U N C T I O N A L D ATA B A S E

          Alexander Kiel University Leipzig HAL8 PaperD AT O M I C - A F U N C T I O N A L D ATA B A S E

          Add to Reading List

          Source URL: www.bioinf.uni-leipzig.de

          Language: English - Date: 2013-05-14 07:18:32
          9Two Phase Commit on Persistent Key Value Store with Data ReplicationDistributed Systems Final Project Xiangyao Yu  Shuotao Xu

          Two Phase Commit on Persistent Key Value Store with Data ReplicationDistributed Systems Final Project Xiangyao Yu Shuotao Xu

          Add to Reading List

          Source URL: css.csail.mit.edu

          Language: English - Date: 2015-01-21 21:28:03
          10Silverlake Symmetri Islamic OmniCard The Current Landscape Islamic banks are faced with a persistent demand from their customers to produce card-based financing options, payment convenience, and the ability to pay for pu

          Silverlake Symmetri Islamic OmniCard The Current Landscape Islamic banks are faced with a persistent demand from their customers to produce card-based financing options, payment convenience, and the ability to pay for pu

          Add to Reading List

          Source URL: www.silverlakesymmetri.com

          Language: English - Date: 2016-04-29 02:07:06