Uploads
Contact
/
Login
Upload
Search Results for 'Gsasha@cs.technion.ac.il Computing'
The Homograph Attack Evgeniy Gabrilovich Alex Gontmakher gabr@acm.org
liane-varnes
1 Jinesh Machchhar and Gershon Elber
yoshiko-marsland
BareMetal Performance for x IO Virtualization Muli BenYehuda Technion IBM Research HiPEAC
myesha-ticknor
INVITED TALKS 2013 Insead Business School (Scheduled), Technion (
stefany-barnette
INTERNATIONALJOURNALFORNUMERICALMETHODSINENGINEERINGInt.J.Numer.Meth.E
tatyana-admore
ABlock-CoordinateDescentApproachforLarge-scaleSparseInverseCovarianceE
alexa-scheidler
BanditConvexOptimization:TowardsTightBounds
celsa-spraggs
Honeypot
trish-goza
Distributed computing mainframe computer workstation network host network link terminal
stefany-barnette
Quantum Computing: The Future of Computing
faustina-dinatale
Trends in the Infrastructure of Computing
tawny-fly
Edge Computing Edge Computing is pushing the frontier of computing applications data and
marina-yarberry
Cloud Computing What is Cloud Computing?
tatyana-admore
FOG Computing Internet of Things (
tatyana-admore
Year 2 Computing Specialism
trish-goza
Computing Ontology
conchita-marotz
The Computing Community Consortium (CCC)
kittie-lecroy
CSCI 1107 Social Computing
danika-pritchard
Overview of Research Computing
briana-ranney
LIGHTWEIGHT CLOUD COMPUTING FOR
olivia-moreira
Advanced Research Computing
jane-oiler
Computing Visions 2025:
calandra-battersby
The Blinded Bandit Learning with Adaptive Feedback Ofe
olivia-moreira
On Avoiding Spare Aborts in Transactional Memory Idit
cheryl-pisano
1
2
3
4
5
6