Search ResultsElectronic Resources 
Limit Search Results
by
Sturm, Rick.
Format:
Excerpt:
8 - APPLICATION MANAGEMENT SECURITY -- APPLICATION DEVELOPMENT -- TOP 25 MOST DANGEROUS SOFTWARE
by
Hwu, Wen-mei.
Format:
Excerpt:
-Inspired Machine Vision 34 A Hybridization Methodology for High-Performance Linear Algebra Software for GPUs 35
by
Betz, Charles T.
ScienceDirect http://www.sciencedirect.com/science/book/9780123705938
Format:
Excerpt:
systems. He holds a summa B.A. in Political Science and a Master of Science in Software Engineering, both
by
Su, Wencong.
Format:
Excerpt:
Application of quantum key distribution to the Energy Internet -- 8.7 Comparison of different cryptography
by
Poznyak, Tatyana.
Format:
Excerpt:
State estimation methods -- 4.1.1 State estimation: a brief survey -- 4.2 Software sensors based on DNNO.
by
Godoi, Fernanda C.
Format:
Excerpt:
PRINTING -- 3.4.1 Basic Principles of the Slicing Software to Prepare 3D Food Printing -- 3.4.2 Printing

Select an Action




