Table computer

Results: 3684



#Item
141PlayStation Portable / PlayStation / Go!Cam / Computer hardware / Memory Stick / Computing / Memory / Cognitive science / PlayStation Portable hardware / PlayStation Portable system software

PSP 3000 MEMORY STICK DUO PDF-6P3MSD6WHUS | Page: 28 File Size 1,136 KB | 25 Jan, 2016 TABLE OF CONTENT

Add to Reading List

Source URL: whytheyhate.us

Language: English - Date: 2016-08-21 21:03:19
142Computing / Software engineering / Compiler optimizations / Computer programming / Loop optimization / Automatic parallelization / Loop nest optimization / CPU cache / Program optimization / Software pipelining / Granularity / Lookup table

Performance Portable Optimizations for Loops Containing Communication Operations Costin Iancu Wei Chen, Katherine Yelick

Add to Reading List

Source URL: crd.lbl.gov

Language: English - Date: 2012-10-24 14:34:01
143Computer access control / Computer security / Cryptography / Identity management systems / Self-service password reset / Password / Authentication / One-time password / The Button / Login / Password fatigue / Password strength

TABLE OF CONTENTS Getting Started ~ Activation Process............................................................................... 1 Enrollment Process..................................................................

Add to Reading List

Source URL: its.com.edu

Language: English - Date: 2015-10-02 12:31:25
144Computer architecture / System software / Windows XP / Software / Enhanced Write Filter / Booting

Windows XP Embedded Advanced Table of Contents4

Add to Reading List

Source URL: annabooks.com

Language: English - Date: 2015-11-13 16:06:33
145Computer network security / Computer security / Cyberwarfare / Computing / Data security / Firewall / Network management / Antivirus software

Classics Department Computing Resources Guide This document is intended to provide quick guidance for new faculty, new graduate students, and research visitors in Classics and AHMA. Table of Contents CalNet ID—the esse

Add to Reading List

Source URL: ucbclassics.dreamhosters.com

Language: English
146Sampling / Survey methodology / Graph / Data mining / Distributed data storage / Machine learning / Distributed hash table / Maximum disjoint set

Compact Samples for Data Dissemination ? Tova Milo, Assaf Sagi, and Elad Verbin School of Computer Science

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2006-10-25 05:08:29
147Search algorithms / Hashing / Cryptographic hash functions / Computational complexity theory / Error detection and correction / Universal hashing / Hash function / UMAC / Hash table / Locality-sensitive hashing / Randomness extractor

Variationally Universal Hashing Ted Krovetz a and Phillip Rogaway b,c a Department of Computer Science, California State University Sacramento CAUSA

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2008-07-02 16:14:32
148Classes of computers / Theoretical computer science / Computer engineering / Computer science / Electrical engineering / Electronic engineering / Charles Babbage / Human-based computation / Crowdsourcing / Mathematical table / Computer / Computing

Foundational Issues in Human Computing and Crowdsourcing David Alan Grier Center for International Science and Technology Policy Elliott School of International Affairs 1957 E Street NW #403

Add to Reading List

Source URL: crowdresearch.org

Language: English - Date: 2011-03-24 21:28:47
149Arithmetic / Numerical analysis / Computer arithmetic / Rounding / Theory of computation / Significant figures / Forest / Standard error

Appendix E Woodland Owners in the Chesapeake Bay Watershed, 2003 Preliminary Results from the National Woodland Owners Survey Table 1 Forestland area by ownership type (standard errors in acres)

Add to Reading List

Source URL: na.fs.fed.us

Language: English - Date: 2015-06-08 10:21:55
150File sharing networks / Distributed data storage / File sharing / Denial-of-service attacks / BitTorrent / Kad network / EMule / Peer-to-peer / Kademlia / Distributed hash table / EDonkey network / Denial-of-service attack

Poisoning the Kad Network Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , and Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, Zurich, Switzerland {lochert,wattenhofer}@tik.ee.ethz

Add to Reading List

Source URL: disco.ethz.ch

Language: English - Date: 2014-09-26 08:36:29
UPDATE