Table computer

Results: 3684



#Item
521Mathematical software / Computer programming / Science / Varicode / Classical cipher / Application software / Desktop publishing software / MathMagic

MathMagic Fonts - Keycode & Glyph Preview Table Font File: 20 1

Add to Reading List

Source URL: www.mathmagic.com

Language: English - Date: 2013-12-27 12:50:48
522Central processing unit / Control register / Microcontrollers / TI MSP430 / Computer architecture / Computing / Instruction set architectures

Microsoft Word - SSD1921-application_note-register_table-1.0.doc

Add to Reading List

Source URL: www.solomon-systech.com

Language: English - Date: 2011-05-27 04:56:57
523Segmentation / Computer programming / Inpainting / Lookup table / Image processing / Computing / Texture synthesis

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 36, NO. X,

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2014-07-19 00:06:23
524Prefix hash tree / Distributed hash table / Trie / Pastry / Peer-to-peer / Hash table / Chord / Tapestry / Tree / Distributed data storage / Computing / Computer programming

file:///C|/Documents and Settin.PDF

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2003-11-18 17:07:49
525Network architecture / Distributed data storage / Routing algorithms / Routing / Chord / Distributed hash table / Peer-to-peer / ZigBee / Geographic routing / Wireless networking / Computing / Technology

Beacon Location Service A Location Service for Point-to-Point Routing in Wireless Sensor Networks Jorge Ortiz, Chris R. Baker, Daekyeong Moon, Rodrigo Fonseca, Ion Stoica Computer Science Division, University of Californ

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2007-04-29 18:29:13
526Mathematical logic / Propositional calculus / Semantics / Digital circuits / Binary arithmetic / Binary numeral system / Boolean circuit / Truth table / FO / Mathematics / Boolean algebra / Theoretical computer science

ICS 1F — Winter 1998 — Midterm Name: Student ID:

Add to Reading List

Source URL: www.ics.uci.edu

Language: English - Date: 1998-02-10 16:51:49
527Secure Shell / Daemon / Password / File Transfer Protocol / Authentication / Internet / Computing / Network architecture

Lecture 24: The Dictionary Attack and the Rainbow-Table Attack on Password Protected Systems Lecture Notes on “Computer and Network Security” by Avi Kak () April 27, 2015

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-04-27 11:09:36
528Regular expression / Pseudo-ring / Mathematics / Computer programming / Software engineering / Control table / Ring theory / Automata theory / Pattern matching

Implementing Domain Specific Languages Alex Miller, BEA Systems I’ll be talking today about implementing DSLs in Java.

Add to Reading List

Source URL: puredanger.com

Language: English - Date: 2010-08-10 13:46:46
529Secure multi-party computation / Circuit complexity / Circuit / Lookup table / Boolean circuit / Advantage / Randomized algorithm / Blinding / Field-programmable gate array / Theoretical computer science / Applied mathematics / Computational complexity theory

Small, Stupid, and Scalable: Secure Computing with Faerieplay∗ Alexander Iliev Sean W. Smith

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2010-11-08 12:53:14
530Network architecture / Distributed hash table / OverSim / Routing / Kademlia / Pastry / Peer-to-peer / Network topology / Overlay network / Distributed data storage / Computing / Computer architecture

Coordinate-based Routing: Refining NodeIds in Structured Peer-to-Peer Systems Fabian Hartmann Bernhard Heep

Add to Reading List

Source URL: doc.tm.uka.de

Language: English - Date: 2009-10-19 09:53:30
UPDATE