Search alternatives:
computing problem » routing problem (Expand search), computing program (Expand search), coping problem (Expand search)
and computing » grid computing (Expand search), fog computing (Expand search), and computer (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
manim python » monty python (Expand search), api python (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
coder and » code and (Expand search), codes and (Expand search), poder and (Expand search)
computing problem » routing problem (Expand search), computing program (Expand search), coping problem (Expand search)
and computing » grid computing (Expand search), fog computing (Expand search), and computer (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
manim python » monty python (Expand search), api python (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
coder and » code and (Expand search), codes and (Expand search), poder and (Expand search)
1
2
“... of code and space. The environmental diffusion of computing should be considered in relation to the...”
Access document
Access document
Article
3
4
“... matter and a geometrical modeler library for describing the detector and locating the particles and...”
Access document (1)
Access document (2)
Access document (1)
Access document (2)
Conference object
5
“...Due to the growing popularity of cloud computing and its numerous benefits, many desktop...”
Access document
Access document
Master thesis
6
“... Gate Arrays to create hardware accelerators for large and complex codes. However, implementing such...”
Access document
Access document
Doctoral thesis
7
“... analysis of transactional code generated by GCC and by a proposed transactional memory support added to the...”
Access document (1)
Access document (2)
Access document (1)
Access document (2)
Conference object
8
“...The aim of this work is to propose a simple and efficient mechanism to deal with the problem...”
Access document (1)
Access document (2)
Access document (1)
Access document (2)
Conference object
9
“... attacks. The attacks generally employ evasion techniques, have anti-forensics capabilities, and use target...”
Access document
Access document
Master thesis
10
11
12
13
14
15
16
17
18
19
“... adaptive computing techniques are applied taking into account a clear separation and systematic treatment...”
Access document
Access document
Article
20