Information Transfer in Soviet Science and Engineering. Rand Corporation, R-2667-ARPA, Santa Monica, California. Personnal'naia mikro-EVM 'Neiron 19.66. (brochure) Minpromsviazi. Personal'naia MikroEVM 'Neiron 19.66. (1988).
410 j2= (n+n)*(m-1)+1 do 470 k= 1,n k2= k2+1 j4= j2+k+k j5= izone(j4) if(j5-n ) 420,475,450 415 if(j5-no-ii ) 430,425,425 420 if(j5-no-lb ) 435,415,415 425 if(plan(jS)-r) 445,480,440 430 if(plan(j5)-s) 445,480,440 435 if(plan(j5)-t) ...
... in: 2013 21st Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, IEEE, 2013, ... Reducing power consumption of gpgpus through instruction reordering, in: Proceedings of the 2016 International ...
A study by Chambers and Bork (1981) of the Computer-Assisted Learning Task Group of the Elementary and Secondary Schools Subcommittee chose a sample of 974 school districts. The results from their work and projections are summed up in ...
[31] A.B. Mahmood Ali, M. Jonsson, Wireless sensor networks for surveillance applications? A comparative survey of MAC protocols, in: Proceedings of the Fourth International Conference on Wireless and Mobile Communications, 2008, pp.
... Modeling and Design BING SHI AND ANKUR SRIVASTAVA Sustainable DVFS-Enabled Multi-Core Architectures with On-Chip Wireless Links JACOB MURRAY, TENG LU, PARTHA PANDE, AND BEHROOZ SHIRAZI Smart Grid Considerations: Energy Efficiency vs ...
Similarly. our device (whose egg is the shrink-wrapped box that encloses it as it comes out of the factory) will ... We can view the hardware of the device as the body. and the software (and particularly its state) as the soul.
... Advanced Research on Computer Science and Information Engineering, Communications in Computer and Information Science, vol. 152, Springer, Berlin, Heidelberg, 2011, pp. 415–421. [19] G.D. Lucca, A.R. Fasolino, P. Tramontana, ...
... 2008 Spring Simulation Multiconference, Society for Computer Simulation International, 2008, pp. 828–835. [116] W.-C. Feng, E. Kaiser, T. Schluessler, Stealth measurements for cheat detection in on-line games, in: Proceedings of the 7th ...
Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in computer hardware, software, theory, design, and applications.
Praise for the Series"Mandatory for academic libraries supporting computer science departments.
Advances in Computers
In-depth surveys and tutorials on new computer technology Well-known authors and researchers in the field Extensive bibliographies with most chapters Many of the volumes are devoted to single themes or subfields of computer science
Praise for the Series"Mandatory for academic libraries supporting computer science departments.
This series covers new developments in computer technology.
Advances in Computers
In this current volume, we present six chapters that give an update on some of the major issues affecting the development of software today. The six chapters in this volume can be divided into two general categories.
The final two chapters explore proteomic techniques for analyzing proteins directly to identify their presence and understand their physical structure. Written by active PhD researchers in computational biology and bioinformatics
... Web server log files, we also investigated the metrics based on page names, i.e., Web application's component names ... Development, Principles, Patterns, and Practices, Prentice Hall, Englewood Cliffs, NJ, USA, 2002. [2] K. Beck, M ...
... dataflow paradigm can achieve significantly better performance compared to the control-flow paradigm when energy efficient computation is the prime ... implementation of tensor operations 157 3. Basic tensor operations for machine learning.