×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [node slide]
Home >
node slide
Attacking Cryptographic Schemes Based on Perturbation Polynomials Martin Albrecht (Royal Holloway), Craig Gentry (IBM), Shai Halevi (IBM), Jonathan Katz.
214 views
CCAMP WG, IETF 78th, Maastricht, Netherlands draft-agraz-ccamp-wson-impairment-ospf-00.txt Fernando Agraz (
[email protected]
) Yabin Ye (
[email protected]
)
214 views
March 12, 2007CICC quarterly meeting1 Optimizing DivKmeans for Multicore Architectures: a status report Jiahu Deng and Beth Plale Department of Computer.
212 views
A General Framework for Fast and Accurate Regression by Data Summarization in Random Decision Trees Wei Fan, IBM T.J.Watson Joe McCloskey, US Department.
217 views
CNGrid: Progress, achievements, and prospects Prof. Qian Depei Director, Sino-German Joint Software Institute (JSI) Beihang University
[email protected]
.
218 views
Advanced XSLT II. Iteration in XSLT we sometimes wish to apply the same transform to a set of nodes we iterate through a node set the node set is defined.
229 views
Advanced XSLT. Branching in XSLT XSLT is functional programming –The program evaluates a function –The function transforms one structure into another.
223 views
XML II: XSL,XPath,XSLT
233 views
School of something FACULTY OF OTHER School of Computing FACULTY OF ENGINEERING Parsing: computing the grammatical structure of English sentences COMP3310.
225 views
©2011 Quest Software, Inc. All rights reserved.. Andrei Polevoi, Tatiana Golubovich Program Management Group ActiveRoles Add-on Manager Overview.
213 views
Pointers. BY SIVAKUMAR.P Pointers OBJECTIVES INTRODUCTION POINTERS DYNAMIC MEMORY ALLOCATION LINKED LISTS APPLICATION.
263 views
Topology-Aware Overlay Construction and Server Selection Sylvia Ratnasamy Mark Handley Richard Karp Scott Shenker Infocom 2002.
213 views
< Previous
Next >