Search Results for - Narrowed by: Springer E-Book Collection - 2014 - Computational Science and Engineering. - Computer science.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dPUBDATE$002509Bas$0025C4$0025B1m$002bY$0025C4$0025B1l$0025C4$0025B1$0025092014$0025092014$0026qf$003dSUBJECT$002509Konu$002509Computational$002bScience$002band$002bEngineering.$002509Computational$002bScience$002band$002bEngineering.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bscience.$002509Computer$002bscience.$0026ps$003d300$0026isd$003dtrue?2024-06-19T21:22:41ZInformation Sciences and Systems 2014 Proceedings of the 29th International Symposium on Computer and Information Sciencesent://SD_ILS/0/SD_ILS:213422024-06-19T21:22:41Z2024-06-19T21:22:41ZYazar Czachórski, Tadeusz. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-09465-6">http://dx.doi.org/10.1007/978-3-319-09465-6</a><br/>Format: Electronic Resources<br/>High-Performance Computing on the Intel® Xeon Phi™ How to Fully Exploit MIC Architecturesent://SD_ILS/0/SD_ILS:208332024-06-19T21:22:41Z2024-06-19T21:22:41ZYazar Wang, Endong. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06486-4">http://dx.doi.org/10.1007/978-3-319-06486-4</a><br/>Format: Electronic Resources<br/>Accuracy Verification Methods Theory and Algorithmsent://SD_ILS/0/SD_ILS:253182024-06-19T21:22:41Z2024-06-19T21:22:41ZYazar Mali, Olli. author.<br/><a href="http://dx.doi.org/10.1007/978-94-007-7581-7">http://dx.doi.org/10.1007/978-94-007-7581-7</a><br/>Format: Electronic Resources<br/>