Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for ''
published presentations and documents on DocSlides.
Animation History and Techniques
by alida-meadow
Week 9 :CCT370 – Introduction to Computer Visua...
PNFS: PERSONALIZED NEWS FILTERING & SUMMARIZATION ON TH
by karlyn-bohler
Authors: . Xindong. Wu, Fei . Xie. , . Gongqing....
Generalized Software Defined Network Platform for Radio Acc
by danika-pritchard
Author: . Aravinthan. . Gopalasingham. , Laurent...
The Evolving Internet
by pasty-toler
Dr. T V . Gopal. Chairman, CSI Division II [Softw...
Department of Computer Science and
by lindy-dunigan
Engineering, and . KINDI Laboratory for . Computi...
An approach for detecting encrypted insider attacks
by danika-pritchard
on . OpenFlow. SDN Networks. Author:. . Charles...
Handout # 10:
by jane-oiler
Transport Protocols. Professor Yashar Ganjali. De...
Build Bright University
by mitsue-stanley
Kingdom of . cambodia. Nation Religion king. Info...
Efcient Inference in Fully Connected CRFs with Gaussian Edge Potentials Philipp Kr ahenb uhl Computer Science Department Stanford University philkrcs
by yoshiko-marsland
stanfordedu Vladlen Koltun Computer Science Depart...
Accurate Unlexicalized Parsing Dan Klein Computer Science Department Stanford University Stanford CA kleincs
by marina-yarberry
stanfordedu Christopher D Manning Computer Science...
Supporting Casual Tutors and Demonstrators A case study in computer science and software engineering Michael Kirley Department of Computer Science and Software Engineering The University of Melbourne
by kittie-lecroy
unimelbeduau Abstract This paper describes the imp...
Computer Virus Propagation Model Based on Variable Propagation Rate Cong Jin QingHua Deng Jun Liu Department of Computer Science Central China Normal University Wuhan China Email jincongmail
by tatiana-dople
ccnueducn Abstract In this paper two different pro...
DISCO Memory Efcient and Accurate Flow Statistics for Network Measurement Chengchen Hu Bin Liu Hongbo Zhao Computer Science and Technology Department Tsinghua University hucliub tsinghua
by yoshiko-marsland
educn zhaohb07mailstsinghuaeducn Chunming Wu Compu...
Efcient and Robust Feature Selection via Joint Norms Minimization Feiping Nie Computer Science and Engineering University of Texas at Arlington feipingniegmail
by danika-pritchard
com Heng Huang Computer Science and Engineering Un...
School of Computer Science and Information Technology University of Nottingham Jubilee Campus NOTTINGHAM NG BB UK Computer Science Technical Report No
by karlyn-bohler
NOTTCSTR20011 Arc Segmentation in Engineering Dra...
Adaptive Color Attributes for RealTime Visual Tracking Martin Danelljan Fahad Shahbaz Khan Michael Felsberg Joost van de Weijer Computer Vision Laboratory Link oping University Sweden Computer Vis
by lindy-dunigan
Universitat Autonoma de Barcelona Spain martindan...
A Fast and Accurate Dependency Parser using Neural Networks Danqi Chen Computer Science Department Stanford University danqics
by sherrill-nordquist
stanfordedu Christopher D Manning Computer Science...
Reachability Analysis for Annotated Code Mikolas Janota Radu Grigore and Micha l Moskal School of Computer Science and Informatics University College Dublin Beleld Dublin Ireland mikolas
by faustina-dinatale
janotaucdie Institute of Computer Science Universi...
Issues Regarding Threshold Concepts in Computer Science Janet Rountree Nathan Rountree Department of Computer Science University of Otago Dunedin New Zealand Email janetnathan cs
by luanne-stotts
otagoacnz Abstract Threshold Concepts deserve disc...
A framework for modelling trojans and computer virus infection Harold Thimbleby Stuart Anderson and Paul Cairns School of Computing Science Middlesex University Bounds Green Road LONDON N NQ
by karlyn-bohler
Department of Computer Science Edinburgh Universi...
Top Queries on Uncertain Data On Score Distribution and Typical Answers Tingjian Ge Computer Science Department Brown University Providence RI USA tigecs
by alexa-scheidler
brownedu Stan Zdonik Computer Science Department B...
Measuring Bottleneck Bandwidth of Targeted Path Segments Khaled Harfoush Department of Computer Science North Carolina State University Raleigh NC harfoushcs
by cheryl-pisano
ncsuedu zer Bestavros Computer Science Department ...
Sorry I Forgot the Attachment Email Attachment Prediction Mark Dredze Computer and Information Sciences Department University of Pennsylvania Philadelphia PA mdredzecis
by jane-oiler
upennedu John Blitzer Computer and Information Sci...
Explicit Interleavers for a Repeat Accumulate Accumulate RAA code construction Venkatesan Guruswami Computer Science and Engineering University of Washington Seattle WA USA Email venkatcs
by luanne-stotts
washingtonedu Widad Machmouchi Computer Science an...
UNCO RRECTED PROOF Adaptable systemsoftware architectures Lawrence Chung a Nary Subramanian Department of Computer Science The University of Texas at Dallas Richardson TX USA Department of Computer
by alida-meadow
Brie64258y stated adaptability is the ability of ...
Artistically Based Computer Generation of Expressive Motion Michael Neff Department of Computer Science University of Toronto neffelfdgp
by lindy-dunigan
torontoedu Eugene Fiume Abstract Understanding how...
LightlySupervised Attribute Extraction Kedar Bellare Partha Pratim Talukdar Giridhar Kumaran Fernando Pereira Mark Liberman Andrew McCallum Mark Dredze Department of Computer Science University
by olivia-moreira
umassedu Department of Computer and Information Sc...
EECS a Advanced Topics in Computer Systems Lecture PaxosMegastore November th John Kubiatowicz Electrical Engineering and Computer Sciences University of California Berkeley httpwww
by calandra-battersby
eecsberkeleyedukubitroncs262 11242014 cs262aF14 Le...
Computing Degree Programs at Winthrop University
by pasty-toler
Winthrop Day 2015. Are there computing jobs . ava...
CE 40763
by conchita-marotz
Digital Signal Processing. Fall 1992. Optimal FIR...
Presentation Title
by marina-yarberry
Presentation Subtitle. This material is based on ...
Dr. V. Jeyakesavan:
by yoshiko-marsland
Academia. , . Industry & . Personal. Dad was ...
Proposals for development of computer software
by conchita-marotz
ProfBerry.com. Karelia, Petrozavodsk. 2012. Who w...
John Vincent Atanasoff
by danika-pritchard
Inventor of the First Electronic Digital Computer...
Department of Computer Science and
by alexa-scheidler
Engineering, and . KINDI Laboratory for . Computi...
Current trends in usage of
by kittie-lecroy
Smart-phones in USA. Dr. Jeyakesavan Veerasamy. D...
Norwich University, Northfield VT One type of computer crime that gets
by lois-ondreau
installing computer chips in gasoline pumps that c...
Research Directions for 21
by cheryl-pisano
st. Century Computer Systems. . ASPLOS . 2013 ....
Comparing manual and computer assisted benthic cover estima
by mitsue-stanley
Aleksej Šaškov. 1. *, . Thomas Dahlgren. 2. , M...
The Neurophysiological Bases
by megan
Enrique A. Lopez-PovedaAlan R. PalmerThe Neurophys...
Load More...