Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for ''
published presentations and documents on DocSlides.
A utomatic Model Generation from Documentation for Java API Functions
by davies
Juan . Zhai. , . Jianjun. Huang. , . Shiqing. Ma...
Two-Tier Model
by tatiana-dople
Kristi Berg. Andrea Donovan. Cheryl Nilsen. Ryan ...
Unlocking Legacy:
by celsa-spraggs
A Practical use of Session Types and Session Inst...
Model Checking Software,
by conchita-marotz
Solving Horn Clauses . Part I. Nikolaj Bjørner ....
CS559: Computer Graphics
by marina-yarberry
Lecture 12: . OpenGL: . ModelView. Li Zhang. Spri...
Model Checking
by pamella-moone
. Software, . Solving Horn Clauses . Part I. Nik...
Linear Modelling II
by sherrill-nordquist
Richard Mott. Wellcome Trust Centre for Human Gen...
TS-4706
by tatiana-dople
Bringing JTable to the Extreme. David Qiao. JIDE ...
Prescient Memory: Exposing Weak Memory Model Behavior by Lo
by olivia-moreira
Man Cao. Jake . Roemer. Aritra. . Sengupta. Mich...
Prescient Memory: Exposing Weak Memory Model Behavior by Lo
by liane-varnes
Man Cao. Jake . Roemer. Aritra. . Sengupta. Mich...
ETSI GANA Model
by gelbero
as Multi - Lay er AI Framework for Autonomic Ne...
Int J Entrepreneurship and Innovation Management Vol 12 No 2 2010 119
by eliza
Jovo Ateljevic Division of Business and Organisati...
Introduction to Computer-Aided Verification
by harmony
Rajeev Alur. . University of Pennsylvania. CAV M...
02 | Developing ASP.NET MVC 4 Models
by giovanna-bartolotta
Jon Galloway | Development Platform Evangelist. C...
Introduction University Mentoring Workshop Systems Microsoft Windows
by harlan
Rajeev Alur. . University of Pennsylvania. CAV M...
Model Physics / Porting Physics to the NMMB
by debby-jeon
NEMS-NMMB Tutorial. 19 February 2014. Brad Ferrie...
CP2014: Teaching CP
by kittie-lecroy
Context. Final Year. 120 credits (1 credit . appr...
Data Movement Challenges at NTS:
by natalia-silvester
A Paradigm for HPC Application I/O. Mark C. Mille...
Modeling Behavior
by sherrill-nordquist
[A&N 14, 15.1-15.5, 15.8.2, 15.11, 21,22.1-22...
Analyzing and Profiling Attacker Behavior in Multistage Int
by lindy-dunigan
1. Contents. Introduction and Background. Literat...
Threaded Programming
by test
Giovanna Lehmann Miotto. ISOTDAQ SCHOOL 2012. Out...
Cholera: Next Door?
by stefany-barnette
BioQUEST. 2012. Case Study Format. Learning Obje...
Microsoft Visual Studio Team System Database Edition
by alida-meadow
. Gert. E.R. Drapers. . Group Engineering M...
Encapsulation
by danika-pritchard
CMSC 202. Types of Programmers. Class programmers...
Explicating SDKs:
by tatiana-dople
Uncovering Assumptions Underlying Secure Authenti...
Directional dipole model for subsurface scattering
by pasty-toler
RMSE=0.169,SSIM=0.775RMSE=0.147,SSIM=0.785RMSE=0.0...
Model Physics / Porting Physics to the NMMB
by myesha-ticknor
NEMS-NMMB Tutorial. 1 April 2015. Brad Ferrier. (...
Characterizing
by jane-oiler
the . Radiative Effects . of . Black Carbon Inter...
Int. J. Contemp. Math. Sciences, Vol. 6, 2011, no. 40, 1989 - 2000Dowl
by pamella-moone
The classical model assumes that if the order quan...
CIT 381
by aaron
introduction to relations. Tables. . movieId. ti...
Cost Models
by celsa-spraggs
Chapter Twenty-One. Modern Programming Languages,...
Efficient Modular Glass Box Software Model Checking
by pasty-toler
Michael Roberson. Chandrasekhar Boyapati. The Uni...
Chapters 12 and 13 A Display Model and Graphics Classes
by tatiana-dople
John Keyser’s. Modifications of Slides by. Bjar...
HISTOLOGICAL PrincipLES OF BRAIN ARTERIES
by natalia-silvester
Intima thickening of penetrating arteries occurre...
Cost Models Chapter Twenty-One
by lois-ondreau
Modern Programming Languages, 2nd ed.. 1. Which I...
Verification of Cache Coherence Protocols
by ellena-manuel
wrt. . . Trace Filters. Parosh. . Aziz Abdulla. ...
Verification of Cache Coherence Protocols
by celsa-spraggs
wrt. . . Trace Filters. Parosh. . Aziz Abdulla. ...
Introduction to parallel programming
by faustina-dinatale
modelS. CS 5802 . Monica Borra. Overview. Types o...
Lecture 7: Solving Recurrences CSE 373: Data Structures and Algorithms
by tatiana-dople
Lecture 7: Solving Recurrences CSE 373: Data Stru...
Global policy framework and standards on ICT accessibility
by priscilla
UNDESA/DSPD FPRUM. DISABILITY INCLUSION AND ACCESS...
Load More...