Table computer

Results: 3684



#Item
231Computer buses / Low-voltage differential signaling / Very-long-baseline interferometry / RS-232 / Clock signal

VLBI Standard Hardware Interface Specification – VSI-H RevisionAugust 2000 Table of Contents 0. 1.

Add to Reading List

Source URL: vlbi.org

Language: English - Date: 2009-08-18 16:35:01
232Cybercrime / Cyberwarfare / Social engineering / E-commerce / Computer network security / Phishing / Denial-of-service attack / Computer security / Targeted threat / Bitcoin / Malware / Supply chain attack

Financial Sector Threats 2015 Year in Review 1 Table of Contents

Add to Reading List

Source URL: info.digitalshadows.com

Language: English - Date: 2016-06-14 16:59:05
233Crime prevention / National security / Cryptography / Information governance / Cybercrime / Computer security / Security / Information security / Bring your own device / Mobile security

Cover Sheet Table of Contents Introduction

Add to Reading List

Source URL: webroot-cms-cdn.s3.amazonaws.com

Language: English - Date: 2016-04-01 16:27:16
234Computational linguistics / Image segmentation / Conference on Computer Vision and Pattern Recognition / Semantic similarity / Artificial intelligence / Market segmentation / Deep learning / Natural language processing / Computational science / Science and technology

Segment-Phrase Table for Semantic Segmentation, Visual Entailment and Paraphrasing Hamid Izadinia† Fereshteh Sadeghi† Santosh K. Divvala‡,† Hannaneh Hajishirzi† Yejin Choi† †

Add to Reading List

Source URL: ai2-website.s3.amazonaws.com

Language: English - Date: 2016-05-10 13:04:56
235Digital signal processing / Computing / Signal processing / Computer programming / Digital photography / Image sensors / Image processing / NyquistShannon sampling theorem / Gaussian blur / Demosaicing / Lookup table / Aliasing

Image Perforation: Automatically Accelerating Image Pipelines by Intelligently Skipping Samples LIMING LOU1,2 , PAUL NGUYEN2 , JASON LAWRENCE2,3 , CONNELLY BARNES2 Shandong University, 2 University of Virginia 1

Add to Reading List

Source URL: www.connellybarnes.com

Language: English - Date: 2016-05-01 11:21:49
236Computing / Concurrent computing / Computer architecture / Routing algorithms / Distributed data storage / Network architecture / File sharing / Routing protocols / Overlay network / Distributed hash table / Routing / Link-state routing protocol

Practical Intrusion-Tolerant Networks Daniel Obenshain∗ , Thomas Tantillo∗ , Amy Babay, John Schultz, Andrew Newell, Md. Endadul Hoque, Yair Amir, and Cristina Nita-Rotaru Johns Hopkins University — {dano, tantillo

Add to Reading List

Source URL: www.cnds.jhu.edu

Language: English - Date: 2016-04-28 20:17:25
237Game artificial intelligence / Monte Carlo tree search / Transposition table / Alphabeta pruning / Minimax / Game tree / Tree traversal / Computer Go / Monte Carlo method / UCT / Tree / General game playing

Transpositions and Move Groups in Monte Carlo Tree Search Benjamin E. Childs, Member, IEEE, James H. Brodeur, and Levente Kocsis. Abstract— Monte Carlo search, and specifically the UCT (Upper Confidence Bounds applied

Add to Reading List

Source URL: www.csse.uwa.edu.au

Language: English - Date: 2009-02-05 01:17:40
238Computing / Memory management / Computer architecture / Software / Virtual memory / Inter-process communication / Page table / Mmap / Page fault / Shared memory / Pointer / Page

OLS 2003 Impressions Put 500 kernel hackers together, and what do you get? Muli Ben-Yehuda

Add to Reading List

Source URL: www.mulix.org

Language: English - Date: 2016-06-16 09:04:09
239Business / Economy / Professional studies / Encodings / Invoice / Computer file formats / QR code / International Bank Account Number / Factoring / JSON / Value-added tax / Code

UsingQR Format specification Revision 2 Table of content 1.

Add to Reading List

Source URL: usingqr.com

Language: English - Date: 2014-06-13 03:08:32
240Computing / Computer architecture / Software / Windows Phone / Smartphones / Cloud clients / Mobile operating systems / Computing platforms / Extensible Application Markup Language / Windows 8 / Microsoft Windows / Windows XP

CodeValue C o lleg e Windows Phone 8 Application Development with C# Course Summary Table

Add to Reading List

Source URL: www.codevalue.net

Language: English
UPDATE