×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [independent confirmation]
Climate Change – The Science, The Future, Strategies
39 views
What is Computer Security. The Problem There are some bad guys: They are called viruses (or viri)
218 views
IceCube EHE analysis Our findings and roadmap to analysis
29 views
Security 0 The Secure Environment. Security 1 The Secure Environment Security goals (C.I.A.) and threats
230 views
The Effects of Surface Heterogeneity on Boundary-Layer Structure and Fluxes Margaret LeMone and Fei Chen, with acknowledgments to collaborators: T. Horst,
224 views
10 September 20031 POOL v1 QA Massimo Lamanna, Jakub Moscicki CERN LCG/SPI
220 views
North American Small Wind Turbine Certification
37 views
2006/6/211 IceCube EHE analysis Our findings and roadmap to analysis Shigeru Yoshida For the EHE working group
224 views
Mirror Cleaning
48 views
Ubiquitous/Pervasive Computing John Stasko Spring 2007 This material has been developed by Georgia Tech HCI faculty, and continues to evolve. Contributors
216 views
What is Computer Security
26 views
< Prev