Search

Your search keyword '"COMPUTER system design & construction"' showing total 327 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER system design & construction" Remove constraint Descriptor: "COMPUTER system design & construction"
327 results on '"COMPUTER system design & construction"'

Search Results

1. Nand to Tetris: Building a Modern Computer System from First Principles.

2. Tracking and Controlling Microservice Dependencies.

3. The Natural Science of Computing: As unconventional computing comes of age, we believe a revolution is needed in our view of computer science.

4. Exponential Laws of Computing Growth.

5. Teaching Undergraduates to Build Real Computer Systems.

6. Fail at Scale.

7. Tom Kilburn: A Tale of Five Computers.

8. The Balancing Act of Choosing Nonblocking Features.

9. EVALUATING SYSTEM ACCESSIBILITY USING AN EXPERIMENTAL PROTOCOL BASED ON USABILITY.

10. The Machine That Would Predict the Future.

11. THINKING MACHINE.

12. Reflecting Human Values in the Digital Age.

13. The computers that behaves like the weather.

14. The Complexity Cross—Implications for Practice.

15. Design of DNA-based innovative computing system of digital comparison.

16. Discrete ripplet-II transform and modified PSO based improved evolutionary extreme learning machine for pathological brain detection.

17. LACross: Learning-Based Analytical Cross-Platform Performance and Power Prediction.

18. A New Mobile Agent-based Middleware System Design for Wireless Sensor Network.

19. The Case for Explicit Ethical Agents.

20. Analogy and Qualitative Representations in the Companion Cognitive Architecture.

22. Use of the Concept of Transparency in the Design of Hierarchically Structured Systems.

23. Fault Injection Acceleration by Simultaneous Injection of Non-interacting Faults.

24. Explaining Engineered Computing Systems' Behaviour: the Role of Abstraction and Idealization.

25. Futures engineering in complex systems.

26. Making Transmission Models Accessible to End-Users: The Example of TRANSFIL.

27. Leaky Buffer: A Novel Abstraction for Relieving Memory Pressure from Cluster Data Processing Frameworks.

28. Hefestos: an intelligent system applied to ubiquitous accessibility.

29. A review on objective measurement of usage in technology acceptance studies.

30. Simulating Reconfigurable Multiprocessor Systems-on-Chip with MPSoCSim.

31. VirtualSoC: A Research Tool for Modern MPSoCs.

32. Quantitative verification and strategy synthesis for stochastic games.

33. Control charting methods for autocorrelated cyber vulnerability data.

34. ABT and SBT revisited: Efficient memory management techniques for object oriented and web-based applications.

35. The CADE-25 Automated Theorem Proving system competition - CASC-25.

36. Lifetime Achievement Award Translating Today into Tomorrow.

37. Modeling and evaluation of highly complex computer systems architectures.

38. An extension of the taxonomy of persistent and nonviolent steps.

39. Technical correspondence.

40. Not only the big need computers.

41. Development of an open source agricultural mobile data collector system.

42. A dynamic modelling framework for control-based computing system design.

43. Strategy based semantics for mobility with time and access permissions.

44. Designing High Quality ICT for Altered Environmental Conditions.

45. An Efficient Approach for System-Level Timing Simulation of Compiler-Optimized Embedded Software.

46. DESIGNING OBJECT ORIENTED SYSTEMS USING STEREOTYPES AND PATTERNS.

47. IMPLEMENTING SHIBBOLETH AT A UK NATIONAL ACADEMIC DATA CENTRE.

50. Design flaws of 'an anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography'.

Catalog

Books, media, physical & digital resources