Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 380
- Development 355
- History 349
- Application software 303
- Engineering & Applied Sciences 237
- Computer Science 177
- Filosofía 152
- Computer programs 138
- Management 129
- Crítica e interpretación 124
- Computer networks 113
- Computer security 113
- Web site development 109
- Java (Computer program language) 107
- Security measures 102
- Computer programming 97
- Cloud computing 94
- Computer software 94
- Microsoft .NET Framework 94
- Historia y crítica 93
- Internet programming 80
- Biblia 76
- Programming 76
- Software engineering 71
- Cristianismo 70
- Artificial intelligence 69
- Job hunting 68
- History and criticism 66
- Design 65
- Business & Economics 63
-
6141Publicado 2019Tabla de Contenidos: “…11.6.1 The Water Component -- 11.6.2 The Oil Component -- 11.6.3 The Gas Component -- 11.6.4 Appearance and Disappearance of Phases -- 11.7 Well Models -- 11.7.1 Inflow-Performance Relationships -- 11.7.2 Multisegment Wells -- 11.8 Black-Oil Simulation with MRST -- 11.8.1 Simulating the SPE 1 Benchmark Case -- 11.8.2 Comparison against a Commercial Simulator -- 11.8.3 Limitations and Potential Pitfalls -- 12 The AD-OO Framework for Reservoir Simulation -- 12.1 Overview of the Simulator Framework -- 12.2 Model Hierarchy -- 12.2.1 PhysicalModel - Generic Physical Models -- 12.2.2 ReservoirModel - Basic Reservoir Models -- 12.2.3 Black-Oil Models -- 12.2.4 Models of Wells and Production Facilities -- 12.3 Solving the Discrete Model Equations -- 12.3.1 Assembly of Linearized Systems -- 12.3.2 Nonlinear Solvers -- 12.3.3 Selection of Time-Steps -- 12.3.4 Linear Solvers -- 12.4 Simulation Examples -- 12.4.1 Depletion of a Closed/Open Compartment -- 12.4.2 An Undersaturated Sector Model -- 12.4.3 SPE 1 Instrumented with Inflow Valves -- 12.4.4 The SPE 9 Benchmark Case -- 12.5 Improving Convergence and Reducing Runtime -- Part IV Reservoir Engineering Workflows -- 13 Flow Diagnostics -- 13.1 Flow Patterns and Volumetric Connections -- 13.1.1 Volumetric Partitions -- 13.1.2 Time-of-Flight Per Partition Region: Improved Accuracy -- 13.1.3 Well Allocation Factors -- 13.2 Measures of Dynamic Heterogeneity -- 13.2.1 Flow and Storage Capacity -- 13.2.2 Lorenz Coefficient and Sweep Efficiency -- 13.3 Residence-Time Distributions -- 13.4 Case Studies -- 13.4.1 Tarbert Formation: Volumetric Connections -- 13.4.2 Heterogeneity and Optimized Well Placement -- 13.5 Interactive Flow Diagnostics Tools -- 13.5.1 Synthetic 2D Example: Improving Areal Sweep -- 13.5.2 SAIGUP: Flow Patterns and Volumetric Connections -- 14 Grid Coarsening -- 14.1 Grid Partitions…”
Libro electrónico -
6142Publicado 2019Tabla de Contenidos: “…3.3.4.2 NoSQL databases -- 3.4 Interoperability and Runtime System Properties -- 3.4.1 Interoperability Reference Model -- 3.4.2 MANTIS Interoperability Guidelines -- 3.4.2.1 Conceptual and application integration -- 3.4.2.2 System interaction model -- 3.4.2.2.1 MANTIS event model -- 3.4.2.2.2 Patterns for interactions -- 3.4.2.3 Implementation integration -- 3.5 Information Security Model -- 3.5.1 Digital Identity -- 3.5.2 Information Mo -- 3.5.3 Control Access Policy Specification -- 3.5.4 Additional Requirements -- 3.6 Architecture Evaluation -- 3.6.1 Architecture Evaluation Goals, Benefits and Activities -- 3.6.2 Concepts and Definitions -- 3.6.3 Architecture Evaluation Types -- 3.7 Conclusions -- References -- Chapter 4 - Monitoring of Critical Assets -- 4.1 The Industrial Environment -- 4.1.1 Extreme High/Low Temperatures (Ovens, Turbines, Refrigeration Chambers etc.) -- 4.1.2 High Pressure Environments (Pneumatic/Hydraulic Systems, Oil Conductions, Tires etc.) -- 4.1.3 Nuclear Radiation (Reactors or Close and Near-By Areas) -- 4.1.4 Abrasive or Poisonous Environments -- 4.1.5 Presence of Explosive Substances or Gases -- 4.1.6 Rotating or Moving Parts -- 4.2 Industrial Sensor Characteristics -- 4.2.1 Passive Wireless Sensors -- 4.2.2 Low-Cost Sensor Solution Research -- 4.2.3 Soft Sensor Computational Trust -- 4.3 Bandwidth Optimization for Maintenance -- 4.3.1 Reduced Data Amount and Key Process Indicators (KPI) -- 4.3.2 Advanced Modulation Schemes -- 4.3.3 EM Wave Polarization Diversity -- 4.4 Wireless Communication in Challenging Environments -- 4.4.1 Design Methodology Basis -- 4.4.2 Requirement and Challenge Identification -- 4.4.3 Channel Measurement -- 4.4.4 Interference Detection and Characterization -- 4.4.5 PHY Design/Selection and Implementation -- 4.4.5.1 Single/multi carrier -- 4.4.5.2 High performance/low power…”
Libro electrónico -
6143Publicado 2019Tabla de Contenidos: “…4.1.3 Sparse Coding Based Network for Image SR -- 4.1.3.1 Image SR Using Sparse Coding -- 4.1.3.2 Network Implementation of Sparse Coding -- 4.1.3.3 Network Architecture of SCN -- 4.1.3.4 Advantages over Previous Models -- 4.1.4 Network Cascade for Scalable SR -- 4.1.4.1 Network Cascade for SR of a Fixed Scaling Factor -- 4.1.4.2 Network Cascade for Scalable SR -- 4.1.4.3 Training Cascade of Networks -- 4.1.5 Robust SR for Real Scenarios -- 4.1.5.1 Data-Driven SR by Fine-Tuning -- 4.1.5.2 Iterative SR with Regularization -- Blurry Image Upscaling -- Noisy Image Upscaling -- 4.1.6 Implementation Details -- 4.1.7 Experiments -- 4.1.7.1 Algorithm Analysis -- 4.1.7.2 Comparison with State-of-the-Art -- 4.1.7.3 Robustness to Real SR Scenarios -- Data-Driven SR by Fine-Tuning -- Regularized Iterative SR -- 4.1.8 Subjective Evaluation -- 4.1.9 Conclusion and Future Work -- 4.2 Learning a Mixture of Deep Networks for Single Image Super-Resolution -- 4.2.1 Introduction -- 4.2.2 The Proposed Method -- 4.2.3 Implementation Details -- 4.2.4 Experimental Results -- 4.2.4.1 Network Architecture Analysis -- 4.2.4.2 Comparison with State-of-the-Art -- 4.2.4.3 Runtime Analysis -- 4.2.5 Conclusion and Future Work -- References -- 5 From Bi-Level Sparse Clustering to Deep Clustering -- 5.1 A Joint Optimization Framework of Sparse Coding and Discriminative Clustering -- 5.1.1 Introduction -- 5.1.2 Model Formulation -- 5.1.2.1 Sparse Coding with Graph Regularization -- 5.1.2.2 Bi-level Optimization Formulation -- 5.1.3 Clustering-Oriented Cost Functions -- 5.1.3.1 Entropy-Minimization Loss -- 5.1.3.2 Maximum-Margin Loss -- 5.1.4 Experiments -- 5.1.4.1 Datasets -- 5.1.4.2 Evaluation Metrics -- 5.1.4.3 Comparison Experiments -- Comparison Methods -- Comparison Analysis -- Varying the Number of Clusters -- Initialization and Parameters -- 5.1.5 Conclusion -- 5.1.6 Appendix…”
Libro electrónico -
6144por Rajkumar, K.Tabla de Contenidos: “…7.5.1 Creating a Package -- 7.5.2 Importing Packages -- 7.5.3 Including Classes to Package -- 7.5.4 Subpackages -- 7.5.5 Protected Members Revisited -- 7.6 Exception Handling -- 7.6.1 Try-catch-finally Statements -- 7.6.2 Multicatch Statement -- 7.6.3 Exception Hierarchy -- 7.6.4 User-defined Exceptions with throw and throws -- 7.6.5 Extending RuntimeException Class -- 7.7 Summary -- Key Terms -- Review Questions -- Exercises -- Part III - Java Containers for Holding Objects -- Chapter 8: Sequence Containers -- 8.1 Introduction -- 8.2 Collection Taxonomy -- 8.3 Vectors -- 8.3.1 Enumeration -- 8.3.2 Type-specific vectors -- 8.4 StringTokenizer -- 8.5 Stack -- 8.5.1 Character Stack -- 8.5.2 Problem: Brackets Matching -- 8.6 Iterators -- 8.7 PriorityQueue -- 8.8 ArrayList -- 8.8.1 Type-Safe ArrayLists -- 8.8.2 Problem: Shopping Cart -- 8.8.3 Problem: Search an Element Inside Array -- 8.8.4 Problem: Merge Two Arrays -- 8.8.5 Problem: Remove All Duplicates in an Array -- 8.9 LinkedList -- 8.9.1 Problem: Designing Stack Using LinkedList -- 8.9.2 Type-safe LLStack Using Generics -- 8.10 Summary -- Key Terms -- Review Questions -- Exercises -- Chapter 9: Map Containers -- 9.1 Introduction -- 9.2 Hashtable -- 9.3 Problem: Word Counting in a Text -- 9.4 Problem: Couples-Sensitive Brackets Checker -- 9.5 HashMap -- 9.6 Multimaps -- 9.7 Nested HashMaps -- 9.8 LinkedHashMap -- 9.9 TreeMap -- 9.10 Problem: Random Number Generator -- 9.11 Properties -- 9.12 Summary -- Key Terms -- Review Questions -- Exercises -- Chapter 10: Set Containers -- 10.1 Introduction -- 10.2 Set Interface -- 10.3 HashSet -- 10.4 Problem: Counting Duplicates in a Text -- 10.5 LinkedHashSet -- 10.6 TreeSet -- 10.7 Summary -- Key Terms -- Review Questions -- Exercises -- Chapter 11: Sorting and Searching -- 11.1 Introduction -- 11.2 Sorting and Searching Using Arrays Class…”
Publicado 2013
Libro electrónico -
6145Tabla de Contenidos: “…8.4.6 Copy the files to a new directory structure -- 8.4.7 Update configuration parameters -- 8.5 Customize WebSphere Application Server for z/OS -- 8.5.1 Update the WebSphere Application Server for z/OS servant region procedure -- 8.5.2 Configure the probe services -- 8.5.3 Configure the z/OS Data Collector Home Runtime -- 8.5.4 Configure the protocol timeout properties -- 8.5.5 Configure the administrative services -- 8.5.6 Configure the servant region libpath -- 8.5.7 Supporting global and Java security -- 8.5.8 Next steps -- 8.6 Start the Data Collector -- 8.7 Optional support for WebSphere Application Server for z/OS Version 5 functions -- 8.7.1 Add SMF support -- 8.7.2 Add PMI support -- 8.7.3 Add JDBC support -- 8.7.4 Add JNDI support -- 8.7.5 Add JMS support -- 8.7.6 Add Message Queue Interface (MQI) capturing support -- 8.7.7 Add multiple host support (multiple IP stacks) -- 8.7.8 Add support for composite requests using CICS Transaction Gateway -- 8.7.9 Add support for composite requests using IMS Connect -- 8.7.10 Add support for J2EE-to-J2EE monitoring -- 8.8 Install into multiple J2EE servers on the same z/OS system -- 8.9 Uninstall the WebSphere Application Server for z/OS Data Collector -- Chapter 9. …”
Libro electrónico -
6146por Darmawan, BudiTabla de Contenidos: “…6.3 Installing the reverse proxy node -- 6.3.1 Prerequisites -- 6.3.2 Tivoli Access Manager: Installing WebSEAL -- 6.3.3 Tivoli Access Manager: Configuring WebSEAL -- 6.3.4 Installing Tivoli Access Manager V5.1 Base Fix Pack 2 -- 6.3.5 Installing Tivoli Access Manager V5.1 WebSEAL Fix Pack 2 -- 6.4 Java Runtime Environment on WebSphere Portal -- 6.5 Enabling SSL between WebSEAL and WebSphere Portal -- 6.5.1 Enabling SSL for the WebSphere Portal server machine -- 6.5.2 Importing IBM HTTP Server certificate into WebSEAL keystore -- 6.5.3 Exporting the WebSEAL certificate -- 6.5.4 Importing WebSEAL certificate into IBM HTTP Server keystore -- 6.5.5 Enabling mutual SSL for IBM HTTP Server -- 6.6 Configuring WebSphere Portal for access authorization -- 6.6.1 Configuring SSL between WebSphere Portal and Tivoli Access Manager -- 6.6.2 Implementing JAAS authentication -- 6.6.3 Modifying WebSphere Portal configuration files -- 6.6.4 Verifying entries in Tivoli Access Manager for WebSphere Portal external authorization -- 6.7 Configuring WebSphere Portal authentication -- 6.7.1 Applying Tivoli Access Manager ACLs to new LDAP suffixes -- 6.7.2 Defining additional MIME types for WebSphere Application Server -- 6.7.3 Creating a WebSEAL junction -- 6.7.4 Enabling forms authentication on WebSEAL -- 6.7.5 Importing WebSphere Portal users and groups into Tivoli Access Manager -- 6.7.6 Defining access controls for WebSphere Portal URIs -- 6.7.7 Configuring the junction mapping table -- 6.7.8 Configuring SSO for WebSEAL and WebSphere through TAI -- 6.7.9 Activating the LTPA junction with WebSEAL -- 6.7.10 Configuring WebSphere Portal login and logout for WebSEAL -- 6.8 Protecting Domino Extended Products -- 6.8.1 Configuring Tivoli Access Manager to not protect the Domino Extended Products…”
Publicado 2004
Libro electrónico -
6147por Gavin, LeeTabla de Contenidos: “…Installation and basic configuration of the WebSphere Data Interchange -- 9.1 Installing WebSphere Data Interchange Client -- 9.2 Server installation and setup -- 9.2.1 Installing WebSphere Data Interchange Server -- 9.2.2 Setting up the WebSphere Data Interchange database -- 9.2.3 Verifying the installation -- 9.2.4 Configuring the client to access the runtime database -- Chapter 10. Installation and basic configuration of the Web Services Gateway -- 10.1 Installing the software -- 10.1.1 Installing and configuring DB2 -- 10.1.2 Installing JDK -- 10.1.3 Installing and updating WebSphere Application Server -- 10.1.4 Updating the IBM HTTP Server -- 10.1.5 Installing IBM SecureWay® Directory Version 3.2.2 for Windows -- 10.1.6 Securing the Web Services Gateway administration pages -- 10.1.7 Configuring WebSphere Application Server for the Web Services Gateway -- 10.1.8 Configuring Web Services Gateway application server and enterprise applications -- 10.1.9 Deploying channels, filters, and the LFT sample for the Web Service Gateway -- 10.1.10 Configuring SecureWay Directory…”
Publicado 2003
Libro electrónico -
6148por International Business Machines Corporation, International Technical Support Organization StaffTabla de Contenidos: “…4.3.6 PL/I settings -- 4.3.7 Assembler settings -- 4.3.8 Link options -- 4.3.9 Application entry point -- 4.3.10 Runtime options -- 4.3.11 Exporting the system definition -- 4.3.12 Importing an existing system definition -- 4.4 Establishing the connection or connections -- 4.4.1 What data sets do we want to see? …”
Publicado 2005
Libro electrónico -
6149Publicado 2003Tabla de Contenidos: “…Configuring the control workstation -- 8.1 Key concepts -- 8.2 Summary of CWS configuration -- 8.3 Key commands and files -- 8.3.1 setup_authent -- 8.3.2 chauthts -- 8.3.3 k4init -- 8.3.4 install_cw -- 8.3.5 .profile, /etc/profile, or /etc/environment -- 8.3.6 /etc/inittab -- 8.3.7 /etc/inetd.conf -- 8.3.8 /etc/rc.net -- 8.3.9 /etc/services -- 8.4 Environment requirements -- 8.4.1 Connectivity -- 8.4.2 Disk space and file system organization -- 8.5 LPP filesets -- 8.5.1 PSSP prerequisites -- 8.6 PSSP filesets installation on the CWS -- 8.6.1 Copy of the PSSP images -- 8.6.2 Move prerequisite files for PSSP 3.5 -- 8.6.3 Copy the minimum AIX image (mksysb) -- 8.6.4 Install PSSP prerequisites -- 8.6.5 Install the runtime files -- 8.6.6 Install the RSCT files -- 8.6.7 Install the HMC-controlled server files -- 8.6.8 Installation of PSSP filesets on the CWS -- 8.7 Setting the authentication services on the CWS -- 8.7.1 Authentication setting on the CWS for remote commands -- 8.7.2 Setting the authentication method for PSSP trusted services -- 8.8 Configuring and verifying the CWS -- 8.9 Sample questions -- 8.10 Exercises -- Chapter 9. …”
Libro electrónico -
6150por Gavin, LeeTabla de Contenidos: “…A Windows with Rules & -- Formatter Extension migration scenario -- 9.1 Base system -- 9.1.1 Preparing for migration -- 9.1.2 Removing WebSphere MQ Integrator V2.1 -- 9.2 WebSphere Business Integration Message Broker installation -- 9.3 Rules & -- Formatter Extension installation -- 9.3.1 Installing the Rules & -- Formatter Runtime Engine -- 9.3.2 Installing the Rules & -- Formatter Design-Time Tooling -- 9.3.3 Install verification -- 9.3.4 Post-install activities -- 9.4 Completing the migration -- 9.4.1 Importing a message flow -- 9.4.2 Starting up -- 9.5 Migrating the broker -- 9.5.1 Preparing to deploy -- 9.5.2 Deploying to the migrated broker -- 9.6 Something to watch out for -- Chapter 10. …”
Publicado 2004
Libro electrónico -
6151por Burns, BrendanTabla de Contenidos: “…Intro -- Inhaltsverzeichnis -- Vorwort -- Kubernetes: Eine Widmung -- Wer dieses Buch lesen sollte -- Warum wir dieses Buch geschrieben haben -- Warum wir dieses Buch aktualisiert haben -- Ein Wort zu aktuellen Cloud-nativen Anwendungen -- Was Sie in diesem Buch finden -- Online-Ressourcen -- Konventionen in diesem Buch -- Tipp -- Warnung -- Der Download und Einsatz von Codebeispielen -- Wie Sie uns erreichen -- Danksagungen -- 1 Einführung -- 1.1 Schnelligkeit -- 1.1.1 Der Wert der Immutabilität -- 1.1.2 Deklarative Konfiguration -- 1.1.3 Selbstheilende Systeme -- 1.2 Ihren Service und Ihre Teams skalieren -- 1.2.1 Entkoppeln -- 1.2.2 Einfaches Skalieren für Anwendungen und Cluster -- 1.2.3 Entwicklungs-Teams mit Microservices skalieren -- 1.2.4 Konsistenz und Skalierung durch Separation of Concerns -- Abb. 1-1 Eine Möglichkeit, wie die verschiedenen Operations-Teams durch APIs entkoppelt sind -- 1.3 Abstrahieren Sie Ihre Infrastruktur -- 1.4 Effizienz -- 1.5 Zusammenfassung -- 2 Container erstellen und ausführen -- 2.1 Container-Images -- 2.1.1 Das Docker-Image-Format -- Container-Layering -- 2.2 Anwendungs-Images mit Docker bauen -- 2.2.1 Dockerfiles -- Listing 2-1 package.json -- Listing 2-2 server.js -- Listing 2-3 .dockerignore -- Listing 2-4 Dockerfile -- 2.2.2 Die Image-Größe optimieren -- 2.2.3 Sicherheit von Images -- 2.3 Multistage Image Build -- 2.4 Images in einer Remote-Registry ablegen -- 2.5 Die Docker Container Runtime -- 2.5.1 Container mit Docker ausführen -- 2.5.2 Die kuard-Anwendung erforschen -- 2.5.3 Den Ressourcen-Einsatz begrenzen -- Speicher-Ressourcen begrenzen -- CPU-Ressourcen begrenzen -- 2.6 Aufräumen -- 2.7 Zusammenfassung -- 3 Ein Kubernetes-Cluster deployen -- 3.1 Kubernetes auf einem öffentlichen Cloud-Provider installieren -- 3.1.1 Google Kubernetes Engine…”
Publicado 2020
Libro electrónico -
6152por Ballard, ChuckTabla de Contenidos: “…How to deploy an EGL Batch or CUI application -- 14.1 A simple EGL batch application -- 14.1.1 How to create the simple batch application -- 14.1.2 The simple batch application: an overview -- 14.2 How to deploy a stand-alone EGL application -- 14.2.1 The Deployment process: an overview -- 14.2.2 The Target OS preparation phase -- 14.2.3 EGL application deployment: SimpleBatchApp -- 14.2.4 Running the EGL application: SimpleBatchApp -- 14.2.5 EGL application deployment: StoresDemo4GLApp -- 14.3 Special EGL deployment topics -- 14.3.1 Curses support for EGL CUI applications on Linux/UNIX -- 14.3.2 EGL runtime property settings for stand-alone applications -- 14.3.3 User defined message files -- Chapter 15. …”
Publicado 2005
Libro electrónico -
6153por Putte, Geert van deTabla de Contenidos: “…Introducing WebSphere Business Integration Connect -- 2.1 Features of WebSphere Business Integration Connect -- 2.2 WebSphere Business Integration Connect Architecture -- 2.2.1 Runtime components -- 2.2.2 Configuration components -- 2.2.3 Profile management -- 2.3 B2B features and standards -- 2.3.1 Transport options -- 2.3.2 Messaging protocol options -- 2.3.3 Business document formats -- 2.3.4 Security options in WebSphere Business Integration Connect -- 2.4 Integration options -- Chapter 3. …”
Publicado 2005
Libro electrónico -
6154Publicado 2004Tabla de Contenidos: “…Web services in DB2 -- 10.1 Introduction to Web services -- 10.1.1 Motivation -- 10.1.2 Requirements for a service-oriented architecture -- 10.1.3 Service-oriented architecture overview -- 10.1.4 Characteristics of the Web service architecture -- 10.1.5 Web services approach for a SOA architecture -- 10.1.6 Properties of the service-oriented architecture -- 10.1.7 More information -- 10.2 DB2 as Web service provider -- 10.2.1 Web Services Object Runtime Framework -- 10.2.2 Installing WORF on IBM WebSphere Application Server -- 10.2.3 Creating DB2 Web services -- 10.2.4 Deploying the Web application -- 10.2.5 Starting the enterprise application -- 10.2.6 Testing the DB2 Web services -- 10.2.7 DADX and auto-deploy feature of WORF -- 10.2.8 WORF test facility -- 10.3 DB2 as Web service consumer -- 10.3.1 Prerequisites -- 10.3.2 Enabling DB2 Web service consumer UDFs -- 10.3.3 Using the Web service consumer UDFs -- 10.3.4 Web service consumer UDFs -- 10.3.5 From WSDL to Web service consumer function -- 10.3.6 Testing the Web service consumer functions -- 10.3.7 Creating a wrapper UDF to Web services consumer function -- Chapter 11. …”
Libro electrónico -
6155por Mussato, AlbertinoTabla de Contenidos: “….: Littera propositi iam dudum conscia nostri / vade fat officium nuntia docta tuum (h . 10 v.) . 7 . Eiusdem ad Iambonum notarium de Andrea super aduentum domini Henrici imperatoris in Italiam (h . 11 r.…”
Publicado 1390
Manuscrito -
6156Publicado 2014“…Queer Insists is a memorial essay, a work of mourning, written for the queer theorist and performance scholar Jose Esteban Muñoz (1967-2013) shortly after his untimely death in December 2013. In a series of fragments, not unlike Roland Barthes's Mourning Diary, Michael O'Rourke shares memories of Muñoz, the stories and reflections of his friends in the wake of his passing, and readings of his work from Disidentifications to Cruising Utopia and beyond. …”
Libro electrónico -
6157por Weber, Julia, author“…Es verfolgt die Entwicklungen von den philosophischen Diskussionen um die Existenz von virtuellen Kräften in der Antike und im Mittelalter über das Aufkommen von virtuellen Räumen in der Frühen Neuzeit bis hin zur Entstehung von virtuellen Welten in der Literatur des 18. …”
Publicado 2024
Libro electrónico -
6158por Association for Computing Machinery“…This includes but not limited to the entire vertical stack ranging from the software components (programming best-practices, tools, compilers, runtime environments, operating-systems) to the hardware and firmware components at support of high level autotuning and runtime adaptivity mechanisms. …”
Publicado 2018
Libro electrónico -
6159Publicado 2009Libro electrónico
-
6160Publicado 2018“…The best hypothesis and explanation to account for this exceptional diversity of remains would argue that Le Placard has been a village occupied by various groups of complex (transegalitarian) hunter-gatherers."…”
Libro