Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Acm-Knowledge'
Acm-Knowledge published presentations and documents on DocSlides.
[DOWLOAD]-Supercompilers for Parallel and Vector Computers (Acm Press Frontier Series)
by adedayofielding
The Desired Brand Effect Stand Out in a Saturated ...
[eBOOK]-Software Engineering - ESEC/FSE \'99: 7th European Software Engineering Conference Held Jointly with the 7th ACM SIGSOFT Symposium on the Foundations ... (Lecture Notes in Computer Science, 1687)
by lochlendemetrio
The Desired Brand Effect Stand Out in a Saturated ...
[READ]-Bulldog: A Compiler for VLIW Architectures (ACM Doctoral Dissertation Award 1985)
by hadendashaun
The Desired Brand Effect Stand Out in a Saturated ...
[BEST]-Project Oberon: The Design of an Operating System and Compiler (Acm Press Books)
by deshunousman
The Desired Brand Effect Stand Out in a Saturated ...
OpticDiscandCupSegmentationfromColorFundusPhotographUsingGraphCutwithP
by pagi
76Y.Zhengetal.ofgeneratingaccuracyandrobustnesseno...
sequenceofstatess0s1stsisi1foralliWith25kwedenotethesu1
by wilson
5InniteTableauxOurrecentapproach[6]isformulat...
TheBitcoinBackboneProtocolAnalysisandApplicationsJuanAGarayTexasAM
by thomas
*AnabridgedversionofthispaperappearsinProc.Eurocry...
Separable Approximation of
by caroline
Ambient. Occlusion. Jing. Huang. 1. . Tamy. ...
Considering a Mandate for Double-Blind Reviewing
by morgan
in ACM Conferences. Jonathan Aldrich, Carnegie Mel...
“ The Scope of Alternative Medicine in the Kingdom of Bahrain
by evans
”. 1. st. International TCM Congress . 19. th....
What causes cancer of the larynx?
by bethany
Smoking. Alcohol consumption. Asbestos can contrib...
Asbestos Awareness & Safety
by wilson
1. PPT-002-03. Bureau of Workers’ Compensation ....
Abstract Types Have Existential Type
by stella
JOHN C MITCHELL Stanford University AND GORDON D P...
FilterBeforeYouParseFasterAnalyticsonRawDatawithSparserShoumikPalkarFi
by ceila
15851581158215771587157915841576158915831588157815...
SoundGradualTypingisNominallyAliveandWellFABIANMUEHLBOECKCornellUniver
by jordyn
5630pageshttps//doiorg/101145/31338801INTRODUCTION...
MachineLearningwithAdversariesByzantineTolerantGradientDescent
by fauna
PevaBlanchardEPFLSwitzerlandpevablanchardepflchElM...
TiDBARaftbasedHTAPDatabaseDongxuHuangQiLiuQiuCuiZhuheFang3XiaoyuMaFeiX
by ani
30833080307430783072308130793084307330773082307530...
ContentslistsavailableatComputersinBiologyandMedicinejournalhomepageww
by payton
Video-oculographyeyetrackingtowardsclinicalapplica...
InterferenceandstabilityAbsentlockinglocalreasoning
by tremblay
tionsintoaresource27TheseaspectscriticalforHoare-s...
HumanAISaleemaWeldVorvoreanuAdamFourneyKoriInkpenTeevanHorvitzMicroso
by susan2
probabilisticbehaviorsbasedbecausetheyovertimeinfu...
SymbolicexecutionwithSYMCCDontinterpretcompileSebastianPoeplauEURECOMA
by audrey
USENIX Association29th USENIX Security Symposium ...
withoutprogrammingGneiss1011wasawebapplicationwithinwhichauthorscouldm
by elizabeth
NamedReferencesMavosexpressionsyntaxresemblesatypi...
XIDEEXPANDINGENDUSERWEBDEVELOPMENTEvgeniaLitvinovaMarkkuLaineandPetri
by julia
XFormsDBextendsXForms11whichispartofXHTML20Figure1...
MiningandAnalyzingtheAcademicNetworkbyZaihanYangADissertationPresented
by anderson
Copyrightcr2014byZaihanYangAllRightsReservediiAppr...
COMPUTATIONALSOCIALROLESDiyiYangCMULTI19001LanguageTechnologiesInst
by adah
KeywordsComputationalsocialscienceconversationalac...
ExampleConstraintsPreferencesPossibleSourceRationale
by murphy
Papersthatdont2twelltogethershouldntbeinthesameses...
ScalablePersistentMemoryFileSystemwithKernelUserspaceCollaborationYou
by lucy
TsinghuaUniversityUniversityofWisconsinMadisonWein...
PosterAutomaticPro2lingofEvasiveMixedModeMalwarewithSEMUShabnamAbough
by ash
Fig1MalwareMalexeevadessystemcalltracingandintrusi...
PEMUDesign
by olivia
OverviewEvaluationsDiscussionConclusionReferencesD...
Download and print the paper doll and
by reese
STEPSbaju kurung templates Use scissors to cut out...
OFLOPSSUMEandtheartofswitchcharacterizationRemiOudin3GianniAntic
by teresa
andperformance.Wereleasethecodepubliclyasopen...
JozaHybridTaintInferenceforDefeatingWebApplicationSQLInjectionAttacks
by adah
Fig.1:NegativeandpositivetaintmarkingsforaSQLquery...
c2018JihoChoi
by hadly
HW-SWCO-DESIGNTECHNIQUESFORMODERNPROGRAMMINGLANGUA...
FASEFPGAAccelerationofSecureFunctionEvaluationSiamUHussainUniversityo
by oconnor
claimthatitisadequateforpreservingprivacyinthecont...
WikiDragonAJavaFrameworkForDiachronicContentAndNetworkAnalysisOfMedia
by okelly
1.1.RelatedWorkThereisavastnumberofalternativepars...
ExpertNoviceInteractionAnnotationandAnalysisSoumiaDermoucheCatherin
by josephine
1https://github.com/hcmlab/novatime.Inthiswork,weu...
2019 IJSRPAS All Rights Reserved
by dorothy
1 International Journal of Scientific Research in ...
con2gurationoncetheprimarycon2gurationismadeIndeedweintendtoma
by bery
Figure1.TheTSARArchitecturewith64CoresSpreadover16...
x0000x0000Former Keku Cannery ABCAMay 24ANALYSIS OF BROWNFIELDS
by wang
Former Keku Cannery ABCAMay 24incl...
AndreeaBobu2121BerkeleyWay80435BerkeleyCA94704H6174170993Babobub
by elizabeth
Education2017presentPhDinComputerScience,Univ...
Load More...