Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Compute-Data'
Compute-Data published presentations and documents on DocSlides.
Lecture 08:
by marina-yarberry
Animation. COMP . 175: Computer . Graphics. March...
Using Graphics Processors for Real-Time Global Illumination
by luanne-stotts
UK GPU Computing Conference 2011. Graham Hazel. W...
Improving the maximum attainable accuracy of communication-
by danika-pritchard
Krylov. . s. ubspace . m. ethods . Erin Carson a...
Rendering battlefield 4
by briana-ranney
with mantle. Johan Andersson – Electronic Arts....
Games
by stefany-barnette
Tamara Berg. CS 560 Artificial Intelligence. Many...
31 110 13 19 19 2 3 2 1 25
by pamella-moone
Compute normalized mutual class complexity between...
Solving problems using propositional logic
by lindy-dunigan
Need to write what you know as propositional form...
Probabilistic Inference
by ellena-manuel
Unit 4,. . Introduction to Artificial . Intellig...
Study on
by conchita-marotz
OpenStack. By . Jai Krishna. List . of Components...
Slide
by mitsue-stanley
. 1. 5-1. CLASSIFIED ADS. . Compute. . the co...
Covertness Centrality
by cheryl-pisano
in . Networks. Michael Ovelg. önne. UMIACS. Univ...
Jia Yao
by karlyn-bohler
Director: . Vishwani. D. . Agrawal. High Perform...
Announcements
by jane-oiler
Phrases . assignment out today:. Unsupervised lea...
ELLIPTIC CURVE CRYPTOGRAPHY
by tawny-fly
By . Abhijith. . Chandrashekar. . and . Dushyan...
across each of the N rotations for an N core CMP are used to compute t
by kittie-lecroy
0.0%10.0%20.0%30.0%40.0%50.0%0.0%70.0%80.0% Core ...
Infrastructure as a Service
by liane-varnes
(. IaaS. ). Amazon EC2. Surendra. Singh . Bisht....
Freedom not Fear:
by briana-ranney
Scalable Anonymous Communication. Mahdi . . Zama...
A Systematic Methodology to Compute the
by phoebe-click
Architectural Vulnerability . Factors for a High-...
1. History of Computer Science: Early calculating aids, modern compute
by phoebe-click
SYLLABUS FOR NATIONAL IT WHIZKIDS COMPETITION
Hydrologic Routing
by danika-pritchard
Reading: Applied Hydrology Sections 8.1, 8.2, 8.4...
Why use Index-Velocity Methods?
by luanne-stotts
Traditional Sites – . Stage vs Discharge. is pr...
Communication costs of LU decomposition algorithms for band
by cheryl-pisano
Razvan. . Carbunescu. 12/02/2011. 1. Outline (1/...
Evaluating scientific software
by myesha-ticknor
Choosing appropriate software. Options.. Create ...
"I was still a couple of miles above the
by pamella-moone
clouds. when . it broke, and with such violence ...
Short Paths on the
by alida-meadow
Voronoi. Graph. and the. Closest Vector Problem ...
Graph
by celsa-spraggs
P. artitioning. a. nd. . Clustering for. Communi...
Bayesian Belief Networks
by calandra-battersby
Structure and Concepts. D-Separation . How do the...
Undersubscribed Threading
by sherrill-nordquist
on . Clustered Cache Architectures. Wim Heirman. ...
Feature extraction: Corners
by debby-jeon
9300 Harris Corners Pkwy, Charlotte, NC. Why extr...
Finding
by pamella-moone
Top-k . Shortest Path Distance Changes in an Evol...
GPU System Architecture
by alida-meadow
Alan . Gray. EPCC . The University of Edinburgh. ...
Cryptography
by briana-ranney
Dec 29. This Lecture. In this last lecture for nu...
Beyond Uber-
by lois-ondreau
Shaders. Experimentations on Improving . shader. ...
Cross-
by debby-jeon
Authentication Codes: Constructions and. Applicat...
Section
by jane-oiler
3.1. The Determinant of a Matrix. Determinants ar...
Quantum Simulation
by kittie-lecroy
Dieter Jaksch. Outline. Lecture 1: Introduction. ...
3.2 Differentiability
by giovanna-bartolotta
Differentiability. A function is differentiable a...
Platform Disaggregation
by myesha-ticknor
Lightening talk. Openlab. Major review. 16. th. ...
Hcm 2010:
by faustina-dinatale
freeway facilities. praveen. . edara. , . ph.d.....
Process View
by tatyana-admore
& . Strategy. Part 3. Performance Measures. N...
Load More...