Public computer

Results: 14618



#Item
1GI-Edition  Gesellschaft für Informatik e.V. (GI) publishes this series in order to make available to a broad public recent findings in informatics (i.e. computer science and information systems), to document conference

GI-Edition Gesellschaft für Informatik e.V. (GI) publishes this series in order to make available to a broad public recent findings in informatics (i.e. computer science and information systems), to document conference

Add to Reading List

Source URL: at.informatik.uni-halle.de

Language: English - Date: 2010-11-26 07:57:58
    2Twin Falls Public Library Computer Use and Internet Access Policy Board Approved October 2010 Revised August 2011 ​Revised March 2013 Revised February 2014

    Twin Falls Public Library Computer Use and Internet Access Policy Board Approved October 2010 Revised August 2011 ​Revised March 2013 Revised February 2014

    Add to Reading List

    Source URL: www.twinfallspubliclibrary.org

    Language: English - Date: 2018-02-21 15:12:14
      3Using the Pleading Template in Your Alameda County Superior Court Case. IMPORTANT: If you are using a public computer at ACLL, you must use a Flash Drive portable storage device or some other means to save your document.

      Using the Pleading Template in Your Alameda County Superior Court Case. IMPORTANT: If you are using a public computer at ACLL, you must use a Flash Drive portable storage device or some other means to save your document.

      Add to Reading List

      Source URL: www.acgov.org

      Language: English - Date: 2015-10-22 14:46:07
        4Computer-supported collaborative argumentation Maxime Morge Abstract. In this paper, we propose a computer-supported collaborative argumentation for the public debate. For this purpose, we use the Analytic Hierarchy Proc

        Computer-supported collaborative argumentation Maxime Morge Abstract. In this paper, we propose a computer-supported collaborative argumentation for the public debate. For this purpose, we use the Analytic Hierarchy Proc

        Add to Reading List

        Source URL: cmna.csc.liv.ac.uk

        Language: English - Date: 2004-07-05 11:30:14
          5Appears in P. Samarati, P. Ryan, D. Gollmann, R. Molva (Eds.): Computer Security – ESORICS 2004, Springer-Verlag LNCS 3193, pp. 335–351, ISBNA Public-Key Encryption Scheme with Pseudo-Random Ciphertex

          Appears in P. Samarati, P. Ryan, D. Gollmann, R. Molva (Eds.): Computer Security – ESORICS 2004, Springer-Verlag LNCS 3193, pp. 335–351, ISBNA Public-Key Encryption Scheme with Pseudo-Random Ciphertex

          Add to Reading List

          Source URL: www.bmoeller.de

          Language: English - Date: 2006-01-02 00:25:23
            6F-35 Lightning II Program Public Release –  ‘A Computer that Happens to Fly’: USAF, RAF Chiefs On Multi-Domain Future By Sydney J. Freedberg Jr., Contributor, Breaking Defense  “I grew up flying fighter

            F-35 Lightning II Program Public Release – ‘A Computer that Happens to Fly’: USAF, RAF Chiefs On Multi-Domain Future By Sydney J. Freedberg Jr., Contributor, Breaking Defense “I grew up flying fighter

            Add to Reading List

            Source URL: www.jsf.mil

            Language: English - Date: 2018-04-18 13:46:48
              7Ng Kong Beng Public Lecture Series 黄光明公开讲座 For the past 40 years computer scientists generally believed that NP-complete problems are intractable. In particular, Boolean satisfiability (SAT), as a paradigma

              Ng Kong Beng Public Lecture Series 黄光明公开讲座 For the past 40 years computer scientists generally believed that NP-complete problems are intractable. In particular, Boolean satisfiability (SAT), as a paradigma

              Add to Reading List

              Source URL: www2.ims.nus.edu.sg

              Language: English - Date: 2017-10-25 03:25:49
                8PUBLIC-ACCESS COMPUTER POLICY* Please come to the library staff with any questions or if any assistance is needed. As computer technology changes constantly, we expect members of the library to have questions. We are hap

                PUBLIC-ACCESS COMPUTER POLICY* Please come to the library staff with any questions or if any assistance is needed. As computer technology changes constantly, we expect members of the library to have questions. We are hap

                Add to Reading List

                Source URL: www.dorchesterlibrary.org

                Language: English - Date: 2010-09-17 10:30:59
                  9FREE COMPUTER TRAINING & CERTIFICATION AT THE PLAINFIELD PUBLIC LIBRARY   Become a Microsoft Office Specialist or get your IC3 certification.

                  FREE COMPUTER TRAINING & CERTIFICATION AT THE PLAINFIELD PUBLIC LIBRARY  Become a Microsoft Office Specialist or get your IC3 certification.

                  Add to Reading List

                  Source URL: www.plainfieldlibrary.info

                  - Date: 2017-09-28 15:29:28
                    10Putting ‘Local’ Back into Public Wifi Hotspots Matthias Korn and Clemens Nylandsted Klokmose Department of Computer Science, Aarhus University Aabogade 34, 8200 Aarhus N, Denmark {mkorn, clemens}@cs.au.dk

                    Putting ‘Local’ Back into Public Wifi Hotspots Matthias Korn and Clemens Nylandsted Klokmose Department of Computer Science, Aarhus University Aabogade 34, 8200 Aarhus N, Denmark {mkorn, clemens}@cs.au.dk

                    Add to Reading List

                    Source URL: mkorn.binaervarianz.de

                    Language: English - Date: 2015-09-18 11:54:45