Time

Results: 196714



#Item
271

Human Computation:1:67-93 c 2014, Lasecki et al. CC-BY-3.0 ISSN: , DOI: hc.v1i1.5 Architecting Real-Time Crowd-Powered Systems

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English
    272

    Bill Lippert, ACØW / Results: North American QSO Party SSB — January 2016 Around the time of each NAQP I receive many comments, some about things the

    Add to Reading List

    Source URL: ncjweb.com

    Language: English - Date: 2016-08-25 09:44:38
      273Graph theory / Pursuit-evasion / Cop number / Tree / Cop-win graph / Tree-depth

      A Tight Lower Bound for the Capture Time of the Cops and Robbers Game Sebastian Brandt1 , Yuval Emek2 , Jara Uitto1, 3 , and Roger Wattenhofer1 1 2

      Add to Reading List

      Source URL: www.tik.ee.ethz.ch

      Language: English - Date: 2018-05-04 09:19:08
      274

      Volume Issue 8 October 7, 2009 President’s Line It’s time for elections for

      Add to Reading List

      Source URL: www.cvars.org

      Language: English - Date: 2014-11-24 17:50:20
        275

        Call for Application - IEEE ECCE 2014 Student Project Demonstration on Emerging Technology Time: 4 PM – 6:30 PM, Sep. 15, 2014 and 12 PM – 2 PM, Sep. 16, 2014 Venue: Exhibition Hall of ECCE 2014, Pittsburgh, PA, USA

        Add to Reading List

        Source URL: ieee-ecce.org

        Language: English - Date: 2017-06-20 09:43:04
          276

          Advanced time-series analysis (University of Lund, Economic History Department) 30 Jan-3 February andMarch 2012 Lecture 9 Vector Autoregression (VAR) techniques: motivation and applications. Estimation procedure.

          Add to Reading List

          Source URL: peterfoldvari.com

          Language: English - Date: 2012-09-29 08:04:49
            277

            time considered as a helix of semi-precious facebook posts 
 [ the white notebooks #10 ]

            Add to Reading List

            Source URL: efanzines.com

            Language: English - Date: 2017-10-16 15:45:28
              278

              DATASHEET Prevent and Block Malicious Network Activity • Detect and pin-point network/traffic anomaly, take proactive action in real time. • Block access to sites associated with spyware, phishing and

              Add to Reading List

              Source URL: www.360.net

              Language: English - Date: 2017-11-29 02:00:35
                279

                Sew much fabric, sew little time! ++ P.O. Box 261, Los Alamos, NMwww.vla.com/lap

                Add to Reading List

                Source URL: www.losalamos.com

                Language: English - Date: 2017-05-02 08:05:46
                  280

                  1 Analytic Queries over Geospatial Time-Series Data using Distributed Hash Tables Matthew Malensek, Sangmi Pallickara, and Shrideep Pallickara, Members, IEEE Abstract—As remote sensing equipment and networked observat

                  Add to Reading List

                  Source URL: galileo.cs.colostate.edu

                  Language: English - Date: 2016-01-16 12:05:26
                    UPDATE