| Dimacs working Group on Analogies Between Computer and Biological Viruses and Their 43.85 Kb. 1 | read |
| AP® Computer Science ab syllabus Students who enter these courses may or may not have any prior programming experience. Both courses are taught using Java as the programming language. All students have their own copy of each textbook and resource book listed below 55.21 Kb. 1 | read |
| Refolana summer school use of open source tools for spatial ecological modelling This 2-weeks refolana course aims at demonstrating different free and open sources tools to carry out spatial ecological modelling and spatial analysis in ecology 42.09 Kb. 1 | read |
| 1. introduction 1 purpose So it gives all the results of it in a systematic manner. When the user clicks the right mouse the first result is read heard. For next result, left mouse is pressed. In this way the user can listen all the results of the required data 146.23 Kb. 1 | read |
| 24 November 2003 Free Open Source idams project Terms of Reference Table of Contents 76.25 Kb. 1 | read |
| Bar-Ilan University Parshat Yitro 5774/January 18, 2014 Parashat Hashavua Study Center Studies, Paul and Helene Shulman Basic Jewish Studies Center, and the Office of the Campus Rabbi. Published on the Internet under the sponsorship of Bar-Ilan University's International Center for Jewish Identity 20.55 Kb. 1 | read |
| Project: Novel Educational / Pedagogical application on Aakash platform (Control Number:-aot18011212366) The major objectives of this project as laid out in the proposal are Port/Create the Educational Software for students from basic learning to advanced learning with animated video contents 67.8 Kb. 1 | read |
| Agency’s Project id: gefsec project id: Country Country Eligibility: Sierra Leone is eligible for funding under paragraph 9(b) of the instrument, and meets all other eligibility requirements for gef funding 396.02 Kb. 3 | read |
| C ase Name: Plant-a-Tree for Every 3-Litre pc sold From In Australia, this commitment extends to the local states where we conduct business. This includes South Australia, the country’s driest state which is particularly vulnerable to climate change and where a state-wide campaign has been launched to revegetate 16.28 Kb. 1 | read |
| Comparative analysis of two algorithm for intrusion attack classification using kdd cup dataset 68.11 Kb. 1 | read |
| International journal of engineering sciences & management a review on variety of intrusion detection system and their functioal approaches M. Tech Student, Department of Computer Science & Engineering, Vedica Institute of Technology, Bhopal (M. P.)-India1 84.72 Kb. 1 | read |
| Version Revision History The srs is intended for users and owners of high-performance clusters, cluster management software, job schedulers and grid resources 68.78 Kb. 1 | read |
| Project descriptions for poets reu program 3D embedded cooling architectures for high power modules Faculty Advisors: Dr. Kenneth Goodson Specific tasks include but not limited to basic calculation and measurement of temperature and pressure drop in microheat exchangers 26.09 Kb. 1 | read |
| Analysis and performance evaluation of the next generation wireless networks Arash Maskooki, Gabriele Sabatino, Nathalie Mitton 88.61 Kb. 2 | read |
| Misti open Data Release The data are available at the Development Data Library (ddl), usaid’s public repository of Agency-funded, machine readable data. The Ddl is part of usaid’s commitment to evidence-based programming and rigorous evaluation 8.45 Kb. 1 | read |