Results 221 to 230 of about 2,675,928 (263)
Some of the next articles are maybe not open access.
Model Curicula for Four-Year Computer Science and Engineering Programs: Bridging the Tar Pit
Computer, 1975The Model Curricula Subcommittee of the IEEE Computer Society Education Committee was formed some 16 months ago to develop an IEEE Computer Society-sanctioned four-year curriculum in computer science and engineering to be used by colleges and universities beginning instruction in this discipline, and by many institutions with existing programs. To date,
openaire +2 more sources
Putting a spin on it: spintronics and super-fast computing
, 2015Smaller, faster, cheaper - that was the trend in computing tar the past 50 years. As microprocessor technology is hitting the limits of what's physically possible, some researchers are exploring whether anew technology, `spintronics', may be the way ...
R. Brazil
semanticscholar +1 more source
Analysis and evaluation of post construction failures of airport apron pavement in Ghana
Journal of Applied Science and Technology, 2016A new apron pavement for parking aircrafts was constructed in 2014, but major depressions occurred when used by aircrafts soon after the construction. Failure analysis revealed structural design inconsistent with the United States Federal Aviation Administration Design Code AC 150-5320-6E.
T.A. Sackey+5 more
openaire +10 more sources
Computational Models Exploring the Role of Flexibility in Binding Tat Peptide to TAR RNA
2019Viral-encoded regulatory proteins interacting with RNA target sequences control the gene expression of lentiviruses, notably the human immunodeficiency virus (HIV) and bovine immunodeficiency virus (BIV). The latter provides a simpler interaction model between the viral trans-activator protein (Tat) and trans-activation response RNA element (TAR ...
openaire +2 more sources
Finding Dominators in Directed Graphs
SIAM journal on computing (Print), 1974This paper describes an algorithm for finding dominators in an arbitrary directed graph. The algorithm uses depth-first search and efficient algorithms for computing disjoint set unions and manipulating priority queues to achieve a time bound of $O(V\log
R. Tarjan
semanticscholar +1 more source
Multi-Instance Iris Recognition
International Conference on Computing Communication Control and automation, 2018Human irises are very rich in texture and have a high degree of uniqueness. This texture information can be used for identification of a human being.
V. Bharadi+4 more
semanticscholar +1 more source
Chemical Engineering and Processing - Process Intensification, 2022
Yijie Wang+11 more
openaire +1 more source
Yijie Wang+11 more
openaire +1 more source
Security and Privacy in Cloud Computing
IEEE Cloud Computing, 2014Z. Tari
semanticscholar +1 more source
Molecular imaging in oncology: Current impact and future directions
Ca-A Cancer Journal for Clinicians, 2022Martin G Pomper, Steven P Rowe
exaly