Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Computer-Concepts'
Computer-Concepts published presentations and documents on DocSlides.
Supercomputer
by ellena-manuel
. Computer Architecture and Design. Fall 2009...
Similarity Learning with (or without) Convolutional Neural
by tatyana-admore
Moitreya Chatterjee, . Yunan. . Luo. Image Sourc...
Software Licenses
by karlyn-bohler
& . Copyright. Objective: “I can understan...
CENG 477
by myesha-ticknor
Introduction to Computer Graphics. Shadows in For...
Rigs & Motion Capture
by olivia-moreira
By: Jennifer Marcial. A presentation on animation...
Rescuing Students in computer science
by myesha-ticknor
By Kyle Urquhart. http://www.youtube.com/watch?v=...
1 Computer Technician
by sherrill-nordquist
Computer Trouble Shooting & Repair Process. C...
Computer-Based
by karlyn-bohler
Testing . (CBT) Certification Tool . (FSA, FCAT 2...
A Growing Threat
by aaron
What is Ransomware?. A type of malware which rest...
Internet of
by min-jolicoeur
Things. Mi. . Gyeong. . Gwak. CSC 540 – Indiv...
PROTECTING YOUR SOFTWARE INNOVATIONS
by lindy-dunigan
Presented by Jenna Wilson. EPIC Law Lunch & L...
©2004 Texas Trade and Industrial Education
by jane-oiler
1. Computer Maintenance 1. Unit Subtitle: Printe...
Predicting Fraud in Companies and Banks
by debby-jeon
Michalis. . Agathocleous. DEPARTMENT OF COMPUTER...
The History of
by trish-goza
Women in Tech. Sarah Dutkiewicz. sarah@cletechcon...
A historical overview
by tatyana-admore
Sources:. Wikipedia. http. ://archives.cnn.com/20...
April 28, 2016
by marina-yarberry
Introduction to Artificial Intelligence ...
By: Cesar Ortiz
by min-jolicoeur
P.2. nd. . Building a computer and its parts. Tw...
Deep Learning for Computer Vision
by yoshiko-marsland
Presenter: . Yanming. . Guo. Adviser: Dr. Michae...
The Computer Club
by danika-pritchard
The Benefits of Joining. . Key...
Hardware and Multimedia
by briana-ranney
Chapter 4. Created by S Cox. Objectives. Explain ...
TYPES OF COMPUTERS
by luanne-stotts
Group members:. Nicola McLeod. Natalia Mullings. ...
PRODUCT DESIGN
by stefany-barnette
WHAT IS PRODUCT DESIGN? . A . product design brie...
CS 480/580
by myesha-ticknor
Introduction to Computer . Architecture. Professo...
November 12, 2013
by pasty-toler
Computer Vision ...
LOP_RE
by natalia-silvester
: Range Encoding for Low Power . Packet Classific...
Magnetic Manipulator
by min-jolicoeur
Team 125. Chad Perkins (Spring Team Lead). John O...
Unit 3—Part A
by ellena-manuel
Computer Memory. Computer Technology. (S1 . Obj. ...
For Friday
by lois-ondreau
Read chapter 27. Program 5 due. Program 5. Any qu...
Learning Invariances and Hierarchies
by danika-pritchard
Pierre . Baldi. University of California, Irvine....
If the Industrial Revolution
by pamella-moone
was about extending . the power of . human muscle...
The Evolving Internet
by pasty-toler
Dr. T V . Gopal. Chairman, CSI Division II [Softw...
1 Angel: Interactive Computer Graphics 5E © Addison-Wesley
by myesha-ticknor
Review. GLUT . Callback Functions. . 2. Angel: I...
IS351-System Analysis
by cheryl-pisano
Lab7: Business . Process Modelling Notation (BPMN...
Introduction to Affective Computing
by stefany-barnette
Professor Beste . Filiz. . Yuksel. University of...
Vulnerability
by danika-pritchard
Analysis. Background. Penetration Studies. Exampl...
Files
by phoebe-click
Presentation by:. Tomas . Luk. ša. Computer File...
CPU DINGBATS
by aaron
See if you can guess the . keywords from the pict...
Chapter 3 Control Structures
by danika-pritchard
In Chapter 2 we looked at the “nuts and boltsâ€...
EML 2023 – Motor Control
by cheryl-pisano
Lecture . 4. . – . . DAQ and Motor Controller...
Frontiers of Computer Science
by faustina-dinatale
Eric Roberts. CS . 106A. March 9, 2016. The Next ...
Load More...