Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'User-Articles'
User-Articles published presentations and documents on DocSlides.
Advanced GUI’s
by myesha-ticknor
Christopher Budo, Davis Nygren, spencer franks, L...
Will P2P Users Cooperate with ISPs?
by celsa-spraggs
A Word-of-Mouth Communication Approach. Piotr. ....
How Completely and Similarly Do Safety Authorities Address
by aaron
Anastasios Plioutsias (Technical University of At...
Ticket #46
by myesha-ticknor
Clarify error responses and allow non-HTTP error ...
Automatic Construction of
by trish-goza
Topic . Maps for Navigation in Information Space ...
Programming by Examples
by lois-ondreau
Marktoberdorf Lectures. August 2015. Sumit Gulwan...
S UPER
by liane-varnes
V. ISION. Detection and Control of In-Sight and O...
The APEX
by sherrill-nordquist
framework: prototyping . of ubiquitous environmen...
OpenEdge
by alexa-scheidler
ABL Multi-Tenancy. ABL Multi-Tenant Programming....
Comprehensive User Profile Synchronization
by cheryl-pisano
Spencer . Harbar. Architect. SPC406. About Spence...
Privacy and User Trust in Context-Aware
by conchita-marotz
Systems. Saskia Koldijk. 1,2. , . Gijs . Koot. 2....
NIMAC for Publishers:
by aaron
How to Create Sub User Accounts . December 2015. ...
Managing Business Access Conflicts
by stefany-barnette
About Thirdware. 2. AUTOMOTIVE. ELECTRONICS. LIFE...
1 Robustness of handwriting recognition systems
by giovanna-bartolotta
What was all that direct manipulation mumbo-jumbo...
How To Do Your Own Compromise Assessment
by tatyana-admore
A Step-by-Step Plan. Corey White, CISSP, CISM. VP...
Matchmaker Policies:
by myesha-ticknor
Users and Groups. HTCondor. Week, Madison . 2017...
MUG Thursday, March 31, 2016
by phoebe-click
Agenda. New Bl...
Evaluating Personal Search
by jane-oiler
. Using . Games. Jinyoung Kim and W. Bruce Croft...
Potential financial motivations
by karlyn-bohler
for end-user programming. Christopher . Scaffidi....
Strong Authentication using Asymmetric Keys on
by olivia-moreira
Devices Controlled by You . Dr. Michael B. Jones....
Powering your apps
by lindy-dunigan
with. . Microsoft accounts. Shelly Guo. Software...
Best and Worst Practices Deploying IBM® Connections
by lois-ondreau
™. Christoph. . Stoettner. About . Me. Christo...
Digimap Ordnance Survey Collection
by stefany-barnette
. Copyright and Terms of use. 24 . February 2016...
Types of Operating Systems
by yoshiko-marsland
Real Time OS. Batch OS. Time Sharing OS. Why do w...
VR Newsroom
by trish-goza
A CGGC/GIP Project by Natan Yellin. Supervisors: ...
m ashing
by sherrill-nordquist
m. etro. . Trip Planner. A Tool for Decentralize...
The Dynamic Marketing Company
by myesha-ticknor
V 1.1. PERSONALISED DYNAMIC MARKETING. Version . ...
Android 13: Input Events
by phoebe-click
Kirk Scott. 1. 2. 3. 4. 5. 6. 7. 8. 9. Introducti...
Inferring Accountability from Trust Perceptions
by marina-yarberry
Koen Decroix, Denis Butin, Joachim Jansen, Vincen...
Security Analysis of a Single Sign-On Mechanism for Distrib
by stefany-barnette
Abstract. Single sign-on (SSO) is a new authentic...
INTRODUCTION TO HADOOP
by jane-oiler
MATT HOLLINGSWORTH. Q: Why . Hadoop. ?. A: Becaus...
Improving and Controlling
by pamella-moone
User-Perceived Delays in Mobile Apps. Lenin Ravin...
Dominant Resource Fairness: Fair Allocation of Multiple Res
by luanne-stotts
Ali . Ghodsi. , . Matei. . Zaharia. , Benjamin ....
Global Application Performance Testing at NYU
by debby-jeon
Component, etc.. (do the software parts work . al...
CS 161: Lecture 3
by giovanna-bartolotta
2/2/17. Context Switches. Context Switching. A co...
Prototype, UI,
by debby-jeon
Ux. , and Risks. Supannika Koolmanojwong. CS577. ...
Windows Server 2012 VDI/RDS Infrastructure and Management
by lindy-dunigan
Adam Carter. Product Marketing Manager. Microsoft...
User Defined Functions Lesson 2
by tatiana-dople
CS1313 Spring 2017. 1. User Defined Functions 2 O...
Towards Differential Query Services in Cost-Efficient Cloud
by pasty-toler
Abstract. Cloud computing as an emerging technolo...
CS252
by lindy-dunigan
Graduate Computer Architecture. Lecture . 17. Mul...
Load More...