Search results
Appearance
The page '"ACM Crossroads"' does not exist; did you mean "ACM Crossroads"? If not, you can create a draft and submit it for review or request that a redirect be created, but consider checking the search results below to see whether the topic is already covered.
- XRDS (magazine) (redirect from ACM Crossroads)XRDS, formerly Crossroads, is the flagship academic magazine for student members of the Association for Computing Machinery (ACM). Issues focus on computer...6 KB (335 words) - 15:47, 28 May 2024
- Obfuscated C Code Contest Protecting Java Code Via Code Obfuscation, ACM Crossroads, Spring 1998 issue Can we obfuscate programs? Yury Lifshits. Lecture...18 KB (1,687 words) - 03:31, 30 June 2024
- games Stabell, Bjørn; Ken Ronny Schouten (1996). "The Story of XPilot". ACM Crossroads. Archived from the original on 2008-05-31. Retrieved 2010-11-02. "XPilot...6 KB (609 words) - 22:01, 16 April 2024
- Stabell, Bjørn; Ken Ronny Schouten (1996). "The Story of XPilot". ACM Crossroads. Archived from the original on 2007-12-12. Retrieved 2009-08-02. Thrust...7 KB (721 words) - 09:21, 15 July 2024
- Retrieved 2010-01-17. Wikimedia Commons has media related to Richard Karp. ACM Crossroads magazine interview/bio of Richard Karp Karp's Home Page at Berkeley...12 KB (876 words) - 06:24, 6 May 2024
- Annals of the History of Computing. A Day in the Life of Bernard Galler, ACM Crossroads (no date) The Mathematics Genealogy Project: Bernard Galler, Department...8 KB (734 words) - 14:27, 20 March 2024
- 1007/978-3-642-14623-7_25. Molnar, D. (2000). "The SETI@Home problem". ACM Crossroads. 7 (1). Smith, S.; Weingart, S. (1999). "Building a high-performance...14 KB (1,887 words) - 03:39, 2 January 2024
- scientist's introductory guide to business process management (BPM), ACM Crossroads 15(4), ACM Press Jacka, J. Mike & Paulette J. Keller (2011), Business...24 KB (3,030 words) - 08:50, 12 July 2024
- Obfuscated C Code Contest Protecting Java Code Via Code Obfuscation, ACM Crossroads, Spring 1998 issue Protect Your Java Code - Through Obfuscators And