×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [specialised hardware]
Midco presentation
245 views
CNS2009handout 16 :: network protocols1 elec5616 computer and network security matt barrie
[email protected]
217 views
A Developers Guide to Encryption
1.946 views
Speech processing research paper 27
7 views
University of Dundee eProcurement Scotl@nd eProcurement Scotl@nd supplier briefing
226 views
Trigger Software Upgrades John Baines, Tomasz Bold, Joerg Stelzer, Werner Wiedenmann 1
216 views
Short-term storage and data documentation Mari Wigham COMMIT
218 views
G. Argyris, I. Kapageridis and A. Triantafyllou Technological Educational Institute of Western Macedonia, Department of Geotechnology and Environmental
213 views
1 The Fortuna PRNG Niels Ferguson. 2 The problem We need to make “random” choices in cryptographic protocols. Computers are deterministic. Standard “random”
216 views
- provides know-how and technology to winners in the foundry industry © NovaCast AB ATAS - Copyright (c) NovaCast1 ATAS Verifier 4.0 Introduction to ATAS
218 views
1 4-Sep-15 Routing CCNA Exploration Semester 2 Chapter 1
239 views
Designing 3D Interfaces Examples of 3D interfaces Pros and cons of 3D interfaces Overview of 3D software and hardware Four key design issues: system performance,
252 views
Next >