System analysis

Results: 15206



#Item
541Online algorithms / Analysis of algorithms / Adversary model / List update problem / K-server problem / Algorithm / Randomized algorithm / Competitive analysis / Metrical task system

Mathemati al Programming manus ript No. (will be inserted by the editor) Susanne Albers Online Algorithms: A Survey

Add to Reading List

Source URL: www14.in.tum.de

Language: English - Date: 2013-11-25 11:03:55
542Web mapping / Data management / Geographic information system / Spatial database / Database / Cartography / GIS software / Object-based spatial database / Spatial analysis

Integrating Multiple Data Representations For Spatial Databases David M. McKeown, Jr. Robert Chi Tau Lai Department of Computer Science Carnegie-Mellon University

Add to Reading List

Source URL: mapcontext.com

Language: English - Date: 2008-08-30 00:27:20
543Bank regulation in the United States / Systemic risk / Valuation / Call report / Federal Reserve System / Asset liability management / Bank / Federal Deposit Insurance Corporation / Financial analysis / Beal Bank

Federal Financial Institutions Examination Council User’s Guide for the Uniform Bank Performance Report – Technical Information

Add to Reading List

Source URL: cdr.ffiec.gov

Language: English - Date: 2016-07-21 19:50:32
544Urban studies and planning / Capital Improvement Plan / CIP / Geographic information system

Update on the Continuing Development of the GeoCIP® Program Oklahoma Department of Commerce Capital Improvement Planning & Center for Spatial Analysis, University of Oklahoma

Add to Reading List

Source URL: www.okmaps.onenet.net

Language: English - Date: 2016-05-12 08:20:05
545Educational stages / Higher education / V-12 Navy College Training Program / Commonwealth System of Higher Education / Pennsylvania State University / State College /  Pennsylvania / Student debt / Public university / University / For-profit higher education in the United States / Student rights in higher education

If I ran the university... Chapter 8, Seven Deadly Sins of Quantitative Political Analysis 1 Philip A. Schrodt Do not go gentle into that good night Rage, rage against the dying of the light.

Add to Reading List

Source URL: 7ds.parusanalytics.com

Language: English - Date: 2013-08-21 12:14:16
546Data types / Procedural programming languages / Type theory / C / Struct / Type safety / Pointer / C++ classes / Recursion / ALGOL 68 / Type system / This

Binding-Time Analysis and the Taming of C Pointers ∗ Lars Ole Andersen DIKU, University of Copenhagen

Add to Reading List

Source URL: repository.readscheme.org

Language: English - Date: 2010-10-22 08:05:06
547Face recognition / Ensemble learning / Boosting / Face detection / Pattern recognition / Eigenface / AdaBoost / Facial recognition system / Linear discriminant analysis / Reliability engineering / K-nearest neighbors algorithm / ViolaJones object detection framework

SUBMITTED FOR PUBLICATION TO: , JUNE 30, Multi-Camera Face Recognition by Reliability-Based Selection

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2007-02-17 09:44:02
548Ada / SPARK / CodePeer / GNAT / A Sharp / Avionics software / Computer programming / Static program analysis / Design by contract / Subroutine / CrazyFlie / Embedded system

technology corner professional training calendar highlights / November 2015–February 2016

Add to Reading List

Source URL: www.adacore.com

Language: English - Date: 2016-03-14 13:19:59
549Geographic information system / Memory / Spatial analysis

Earthquakes,  Hurricanes,  and  Mobile  Communication   Patterns  in  the  New  York  Metro  Area:  Collective  Behavior   during  Extreme  Events   Christopher Small1,

Add to Reading List

Source URL: www.kiskeya.net

Language: English - Date: 2015-06-24 15:21:20
550Microcontrollers / Disk encryption / Instruction set architectures / Cryptographic software / Non-volatile memory / PIC microcontroller / USB flash drive / Serial Peripheral Interface Bus / In-system programming / Flash memory / Firmware / Encryption

Analysis of an encrypted HDD J. Czarny, R. Rigo May 11, 2015 Abstract The idea of this presentation is to debunk the myth that analyzing the security of hardware is difficult. From the perspective of a software reverse e

Add to Reading List

Source URL: www.sstic.org

Language: English - Date: 2015-05-26 11:04:26
UPDATE