×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [node slide]
Attacking Cryptographic Schemes Based on Perturbation Polynomials Martin Albrecht (Royal Holloway), Craig Gentry (IBM), Shai Halevi (IBM), Jonathan Katz
216 views
CCAMP WG, IETF 78th, Maastricht, Netherlands draft-agraz-ccamp-wson-impairment-ospf-00.txt Fernando Agraz (
[email protected]
) Yabin Ye (
[email protected]
)
216 views
March 12, 2007CICC quarterly meeting1 Optimizing DivKmeans for Multicore Architectures: a status report Jiahu Deng and Beth Plale Department of Computer
217 views
A General Framework for Fast and Accurate Regression by Data Summarization in Random Decision Trees Wei Fan, IBM T.J.Watson Joe McCloskey, US Department
219 views
CNGrid: Progress, achievements, and prospects Prof. Qian Depei Director, Sino-German Joint Software Institute (JSI) Beihang University
[email protected]
222 views
Lewin A 1, Richardson S 1, Marshall C 1, Glazier A 2 and Aitman T 2 (2006), Biometrics 62, 1-9. 1: Imperial College Dept. Epidemiology 2: Imperial College
225 views
Advanced XSLT II. Iteration in XSLT we sometimes wish to apply the same transform to a set of nodes we iterate through a node set the node set is defined
237 views
Advanced XSLT. Branching in XSLT XSLT is functional programming –The program evaluates a function –The function transforms one structure into another
231 views
XML II: XSL,XPath,XSLT
257 views
School of something FACULTY OF OTHER School of Computing FACULTY OF ENGINEERING Parsing: computing the grammatical structure of English sentences COMP3310
232 views
©2011 Quest Software, Inc. All rights reserved.. Andrei Polevoi, Tatiana Golubovich Program Management Group ActiveRoles Add-on Manager Overview
215 views
Pointers. BY SIVAKUMAR.P Pointers OBJECTIVES INTRODUCTION POINTERS DYNAMIC MEMORY ALLOCATION LINKED LISTS APPLICATION
281 views
< Prev
Next >