iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ memory
جزئیات خدمات ترجمه در ترجمه تخصصی
data
memory
memory
memory
CSMPU
BioSec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human b - Parallel Processing Workshops, 2003. Proceedings. 2003 International Conference on
BioSec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human b - Parallel Processing Workshops, 2003. Proceedings. 2003 International Conference on
server
server
cache
memory
memory
very
data
therapist
dynamic
data
data
data
data
data
Individual Differences Research www.idr-journal.com
FutureGenerationComputerSystems ( ) –
IEEE TRANSACTIONS ON COMPUTERS, VOL. 60, NO. 3, MARCH 2011 335
ESWA 8102 No. of Pages 12, Model 5G
a[i] b[i] c[i]
ThisarticleappearedinajournalpublishedbyElsevier. Theattached
Computers & Operations Research 39 (2012) 42-47
IEEE TRANSACTIONS ON COMPUTERS, VOL. 60, NO. 3, MARCH 2011 335
Shi et al. BMC Research Notes 2011, 4:189
lllllllllllllllllIllllIllllllllllllllIlllllllllllllllllllllllllllllllllllll
PRIME 2013, Villach, Austria Session M3C { Digital Circuits
PRIME 2013, Villach, Austria Session M3C { Digital Circuits
2013 10th IEEE International Conference on Control and Automation (ICCA)
2013 10th IEEE International Conference on Control and Automation (ICCA)
562 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 30, NO. 4, APRIL 2011
562 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 30, NO. 4, APRIL 2011
PART3
Implementation of a hardware and software
J.ParallelDistrib.Comput.71(2011)1075–1084
IEEE COMPUTER ARCHITECTURE LETTERS, VOL. 12, NO. 2, JULY-DECEMBER 2013 59
Implementation of a hardware and software
[3B2-14] mdt2011010044.3d 13/1/011 15:51 Page 44
Improving Smart Card Security using Self-timed Circuits
the Detective as Historian in the Novels of Philippa Pearce
the Detective as Historian in the Novels of Philippa Pearce
the Detective as Historian in the Novels of Philippa Pearce
A WSN is a highly dynamic network because nodes die
A WSN is a highly dynamic network because nodes die
A WSN is a highly dynamic network because nodes die
A WSN is a highly dynamic network because nodes die
A WSN is a highly dynamic network because nodes die
A WSN is a highly dynamic network because nodes die
WSNs invariably operate in an unattendedmode and inmany scenarios it
to extend and amend principles that arise in other types
Digital Design Using HDL Project Report IMAGE PROCESSING USING FPGA
5. RELATIONS BETWEEN PRAM MODELS 25
5. RELATIONS BETWEEN PRAM MODELS 25
channel decoders must not only produce estimates of the transmitted
Implementation of a 3GPP LTE Turbo Decoder
known brand amongst enthusiasts for PC prosumer users who are
known brand amongst enthusiasts for PC prosumer users who are
2012 15th Euromicro Conference on Digital System Design 2012 15th Euromicro Conference on Digital System Design 2012 15th Euromicro Conference on Digital System Design
ABSTRACT Buffer overflow vulnerabilities are caused by programmingerrors that allow
Multi-objective harmony search algorithm for optimal power flow problem
ABSTRACT Buffer overflow vulnerabilities are caused by programmingerrors that allow
5.1. Complexity Classes and the Parallel Processing Thesis. In this chapter
was the codename for the new Piledriver core based FX
PROJECT REPORT
PROJECT REPORT
PROJECT REPORT
Before we dive into the story and architecture of Maxwell
CHAPTER 3
english
Before we dive into the story and architecture of Maxwell
Journal of Computational Science 5 (2014) 90–98
Journal of Computational Science 5 (2014) 90–98
Journal of Computational Science 5 (2014) 90–98
which dramatically simplifies GPU programming by giving programmers a single
which dramatically simplifies GPU programming by giving programmers a single
which dramatically simplifies GPU programming by giving programmers a single
which dramatically simplifies GPU programming by giving programmers a single
Lares: An Architecture for Secure Active Monitoring Using Virtualization
J.ParallelDistrib.Comput.73(2013)4–13
1 Introduction Understanding of server capacity is crucial to server
Lares: An Architecture for Secure Active Monitoring Using Virtualization
Adaptive Software Cache Management for
Kernel Memory Protection by an Insertable Hypervisor
Neuropsychological Functioning in Children with
High-Performance Packet Classification on GPU
High-Performance Packet Classification on GPU
High-Performance Packet Classification on GPU
The Bw-Tree: A B-tree for New Hardware
The Bw-Tree: A B-tree for New Hardware
The Bw-Tree: A B-tree for New Hardware
The Bw-Tree: A B-tree for New Hardware
Proceedings of the IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI 2012)
A Comparison of Binary Number Generators for Wireless Body Sensor Networks Security
CHAPTER 8
You can find detailed information about nine foods for brainpower
Neuroscience and Biobehavioral Reviews 28 (2004) 663–674
Neuroscience and Biobehavioral Reviews 28 (2004) 663–674
Human Movement Science 24 (2005) 362–378
It has been an interesting week with all the hype
Marissa Mayer Data mining is going through a signifi cant
High-PerformanceHardwareMonitorstoProtectNetwork
Downloaded from http://www.elearnica.ir
A Lightweight Online Approach to Protecting Kernel Hooks in Kernel
8 Foods That Help Improve Your Memory
Microelectronics Reliability 54 (2014) 1050–1055
algorithm parallel
[3B2-14] mmi2010020005.3d 23/3/010 15:43 Page 56
13338 • TheJournalofNeuroscience,December20,2006 • 26(51):13338–13343
Linux System Calls
we are lucky to get a new boot being launched
Alzheimer’s Disease Rehabilitation using
Alzheimer’s Disease Rehabilitation using
The 9th International Conference for Young Computer Scientists
2012 15th Euromicro Conference on Digital System Design 2012 15th Euromicro Conference on Digital System Design 2012 15th Euromicro Conference on Digital System Design
1906 IEEE TRANSACTIONS ON COMPUTERS, VOL. 62, NO. 10, OCTOBER 2013
Downloaded from learnmem.cshlp.org on March 28, 2015 - Published by Cold Spring Harbor Laboratory Press
Downloaded from learnmem.cshlp.org on March 28, 2015 - Published by Cold Spring Harbor Laboratory Press
Downloaded from learnmem.cshlp.org on March 28, 2015 - Published by Cold Spring Harbor Laboratory Press
Current Applied Physics 14 (2014) 232e236
Current Applied Physics 14 (2014) 232e236
17
Unit 8 The early 1970s saw the birth of the
is usually used to refer to the internal storage locations
Michael PAGE
Michael PAGE
dundancy for L1 caches corresponding to the L2 cache with
.. · ... ·.·.
Microelectronics Reliability 47 (2007) 461–470
Microelectronics Reliability 47 (2007) 461-470 www.elsevier.com/locate/microrel Dependability evaluation of Altera FPGA-based embedded
Your manuscript has been reviewed, and we regret to inform you that it has not been found suitable for
1
A Survey on Deep Packet Inspection for Intrusion Detection Systems
The first generation Nantero NRAM technology was based on a
17
SLEEP
core designs migrated from Symmetric Multi Processing to cache coherent
core designs migrated from Symmetric Multi Processing to cache coherent
Short-Term and Long-Term Memory Involve Different until the middle of the 20th century many psycholo-
Linux Kernel Vulnerabilities: State-of-the-Art Defenses
Long-Term Memory Can Be Classified As
CAMP: Fast and Efficient IP Lookup Architecture
CAMP: Fast and Efficient IP Lookup Architecture
HIMA: A Hypervisor-Based Integrity Measurement
Chapter 3
intensive applications that are mission critical to your business perform
intensive applications that are mission critical to your business perform
intensive applications that are mission critical to your business perform
intensive applications that are mission critical to your business perform
intensive applications that are mission critical to your business perform
SPRINGER BRIEFS IN APPLIED SCIENCES AND
SPRINGER BRIEFS IN APPLIED SCIENCES AND
SPRINGER BRIEFS IN APPLIED SCIENCES AND
Code Composer
ForwardingMetamorphosis: FastProgrammable
This paper aims to overcomes two limitations in current switching
for analyzing the behavior of non-visitors, being them tourists that had never travelled to
Understanding OrganizationalMemory Introduction It is generally recognized that Walsh and
Slim Multinational Enterprises Bottom of Form Top of Form Bottom
Information Processing and Management 48 (2012) 903–917
While this population of children was recognized as early as
Lawrence Berkeley National Laboratory
Creation Date: 3 March 2015 | Review Date: 3 March 2015
data compression
data compression zlib
which prevent sets of concurrent processes from completing their tasks
which prevent sets of concurrent processes from completing their tasks
Parallel Artificial Bee Colony (PABC) Algorithm
which prevent sets of concurrent processes from completing their tasks
Interface Design: A Focus on Cognitive Science
ViPZonE:OS-LevelMemoryVariability-DrivenPhysical
Interface Design: A Focus on Cognitive Science
chapter
Psychological Review
Skinflint DRAM System: Minimizing DRAM Chip Writes for Low Power
Saifi
Behavioural Brain Research 283 (2015) 11–15
Behavioural Brain Research 283 (2015) 11–15
uses hybrid neural networks to simulate tasks in cognitive psychology
uses hybrid neural networks to simulate tasks in cognitive psychology
Procedia Computer Science
Information
Behavioural Brain Research 283 (2015) 11–15
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
CLOUD COMPUTING 2015 : The Sixth International Conference on Cloud Computing, GRIDs, and Virtualization
Psychology, 2015, 6, 1915-1929
Nicholas Carr's „The Shallows. What the
Nicholas Carr's „The Shallows. What the
Carnegie Mellon University
Brain and Cognition 55 (2004) 30–40
2015 International Conference on Industrial Instrumentation and Control (ICIC)
Analysis and Implementation of Packet
2010 International Conference on High Performance Switching and Routing
1
Ambitious applications must fight OS
Ambitious applications must fight OS
54159
رابطه ی اهداف پیشرفت با حافظه کاذب در نوجوانان بزهکار
رابطه ی اهداف پیشرفت با حافظه کاذب در نوجوانان بزهکار
REVIEW
Introduction Scalable computers have moved from the research lab to
A Virtual Machine Monitor Disco is a virtual machine monitor
Disco acts as a gateway that uses the network interfaces
Efficient Live Migration of Virtual
Progress in Polymer Science 49–50 (2015) 3–33
BetweennessCentralityonGPUsandHeterogeneous
Low melting aliphatic polyesters are probably the mostoften utilized soft
Low melting aliphatic polyesters are probably the mostoften utilized soft
Low melting aliphatic polyesters are probably the mostoften utilized soft
Low melting aliphatic polyesters are probably the mostoften utilized soft
The research on SMPs has developed to an interestingand vital
The research on SMPs has developed to an interestingand vital
The research on SMPs has developed to an interestingand vital
The research on SMPs has developed to an interesting and
Low melting aliphatic polyesters are probably the mostoften utilized soft
Shape memory polymers based on a glass transition The above
Shape memory polymers based on a glass transition The above
LONG TERM SHOR Y MEMOR
•
34311 (1) - MS08-040: Microsoft SQL Server Multiple Privilege Escalation (941203) (uncredentialed
20 The perception–action cycle
HOW THE
2.8 Associative learning process for memory construction
Comparative Performance Analysis of
Journal of Experimental Child Psychology 146 (2016) 66–78
LIDA and moral decision making LIDA is a model of
Page 1 of 8
Larger-than-MemoryDataManagementon
Stephen Hawking has delivered a speech addressing the seriousness of
Distrib. Comput. (2011) 24:65–78
Cognitive Psychology
REAL-TIME SYSTEMS
REAL-TIME SYSTEMS
the adversary could detect and identify the virtual system he
the adversary could detect and identify the virtual system he
the adversary could detect and identify the virtual system he
REAL-TIME SYSTEMS
Computer Communications 29 (2006) 3037–3050
Computer Communications 29 (2006) 3037–3050
Overview
1
22 May 2002 10:35 AR AR160-19.tex AR160-19.SGM LaTeX2e(2002/01/18) P1: GJC
22 May 2002 10:35 AR AR160-19.tex AR160-19.SGM LaTeX2e(2002/01/18) P1: GJC
NIH-PA Author Manuscript NIH-PA Author Manuscript NIH-PA Author Manuscript
Remote reads are read directly from memory into the network
NIH-PA Author Manuscript NIH-PA Author Manuscript NIH-PA Author Manuscript
s AIC and differs from traditional Interrupt Controllers since it
Parallel Computing 42 (2015) 75–87
Parallel Computing 42 (2015) 75–87
INVITED
http://tarjomebazar.com
Cognitive Training Improves Sleep Quality and Cognitive Function among Older
Cognitive Training Improves Sleep Quality and Cognitive Function among Older
Review
politics and international context and those studies focusing on domestic
politics and international context and those studies focusing on domestic
politics and international context and those studies focusing on domestic
The transitional state between the cognitive changes of normal aging
MODERN
We Finally Have Some New Insight Into How PTSD Occurs
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
Behavioural predictors and neural substrates a b s t r
Chapter 4
2 Beta Network 4 Miscellaneous considerations 5 Optimization and performance
2 Beta Network 4 Miscellaneous considerations 5 Optimization and performance
and Storage Technologies The right peripherals can make all the
Chapter 4
سلام و خسته نباشید
سلام و خسته نباشید
Memory
Results from My Mind Project Abstract Cognitive decline and dementia
Results from My Mind Project Abstract Cognitive decline and dementia
Results from My Mind Project Abstract Cognitive decline and dementia
An Oracle server includes an Oracle Instance and an Oracle
Results from My Mind Project Abstract Cognitive decline and dementia
Behavioural Brain Research 240 (2013) 197– 201
■
Distributed Operating System and Scheduling for MPSoC
0
HANDBOOK OF THE PSYCHOLOGY
Processor Architecture Springer-Verlag Berlin Heidelberg GmbH v
Cells: AVirtualMobileSmartphoneArchitecture
Cells: AVirtualMobileSmartphoneArchitecture
Cells: AVirtualMobileSmartphoneArchitecture
Cells: AVirtualMobileSmartphoneArchitecture
Cells: AVirtualMobileSmartphoneArchitecture
I miss you a lot. But your memory lives on forever. It’s amazing the impact
I miss you a lot. But your memory lives on forever. It’s amazing the impact
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation Downloaded from http://iranpaper.ir
Despite the vast amount of time this state takes from
Despite the vast amount of time this state takes from
term total sleep deprivation has a significant deleterious effect across
NeuralTuringMachines
Michalis Polychronakis
AP Psychology Vocabulary
Simpo PDF Merge and Split Unregistered Version - http://www.simpopdf.com Simpo PDF Merge and Split Unregistered Version - http://www.simpopdf.com
Simpo PDF Merge and Split Unregistered Version - http://www.simpopdf.com
Simpo PDF Merge and Split Unregistered Version - http://www.simpopdf.com
AA-Sort: A New Parallel Sorting Algorithm for Multi-Core SIMD Processors
AA-Sort: A New Parallel Sorting Algorithm for Multi-Core SIMD Processors
MODERN
652 SECURITY CHAP.9
IEEE TRANSACTIONS ON COMPUTERS, VOL. c-21, NO. 4, APRIL 1972 353
106 CHAPTER 2 Computer Clusters for Scalable Parallel Computing
Guarantee IP Lookup Performance with FIB Explosion
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2018.2817685, IEEE
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2018.2817685, IEEE
Content Paradox False memories are influenced by a variety of
Althoughthere have been occasional controversies as to how best to
An advantage of the latter procedure is that a basicmemory
like listson which the words resembled each other in sound
and Rajaram usedthematically related groups of emotional words and pictures
a picture depicting passengers boarding anairplane was described as headed
The Story So Far Before moving on to emotional context
Storbeck and Clorefound that the positive mood group exhibited more
Storbeck reported some experiments that focused onwhether negative moods promote
sprocedure in three experiments and added a second control conditionin
and Elliot used a video mood inductionprior to DRM list
the memoryeffects of mood states will depend on the level
the protective effect of negative moods may beattributable to the
5015
FUSE: Fusing STT-MRAM into GPUs to Alleviate Off-Chip Memory Access
2015 27th International Symposium on Computer Architecture and High Performance Computing
J.ParallelDistrib. Comput. 73(2013)52–61
Anhedonia and the Relationship Between Other Depressive Symptoms and Aggressive
U n i t � 2 � � � � � � � � � � � � � � � � C o m p u t e r � A r c h i t e c t u r e s �
PARDISO Solver
Analysis of COMSOL Multiphysics Parallel
Immunol Res (2014) 59:118–128
2018 International Conference on Field-Programmable Logic and Applications
65
65
66
67
67
Dissertation der
Unit 7
65
This threat arises when an attacker scans the physical memory
Downloaded from http://journals.lww.com/ectjournal by BhDMf5ePHKav1zEoum1tQfN4a+kJLhEZgbsIHo4XMi0hCywCX1AWnYQp/IlQrHD3i3D0OdRyi7TvSFl4Cf3VC1y0abggQZXdtwnfKZBYtws= on 01/30/2021
Computers in Human Behavior 81 (2018) 325e339
Computers in Human Behavior 81 (2018) 325e339
192 Vol. 7, No. 2 / February 2020 / Optica
CounsellingandPsychotherapyResearch
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/LCA.2017.2701370, IEEE Computer
Thi T T T Th T T T Th Th
Thi T T T Th T T T Th Th
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/266975250
Red Team Operating in a
Proven track record
Downloaded from https://academic.oup.com/nc/article/2016/1/niv011/2472543 by guest on 06 November 2021
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/3044068
Functional Implementation Techniques for CPU Cache Memories
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
54
? ?
10 Trivedi: Cognitive deficits in psychiatric disorders: Current status
S