Browse
Recent Uploads
Content Categories
Featured Contents
SlideOrbit Features
Free PPT Templates
Upload
Login
Veronica
@jveron
/
/
1477 Uploads
Presentations (1477)
University of Jordan Innovation and Entrepreneurship Center Overview
Memory Hierarchy and Cache in Computer Systems
Emergency Kit Procedures and Accessing Narcotic E-Kits in Arkansas
Multi-Stakeholder Intervention for Sustainable Digital Start-ups in Azerbaijan
Innovative Solution for Addressing Market Needs
Variation-Tolerant OpenMP Tasking for Processor Clusters
Reasoning with Bayesian Belief Networks: Overview and Applications
IEEE 802 EC-22/0204r0 November 2022 Meeting Highlights
Darwesh Shaka Accelerometer Project Components and Game Controller Programming
Advanced Machine Learning: Optimization and Parallel Computing
Unveiling the Power of GPUs in High-Performance Computing
Evolution of Graphics Processing Units (GPUs) in Computing History
Leveraging Parallelism on GPUs for Enhanced Performance
General Purpose GPU Advantages and Applications
Abstraction in Computer System Architectures
Partially Observable Markov Decision Processes (POMDPs)
Computer Data Storage and Memory Addressing
Outsourcing and Offshoring in Economics
Automated Grading Implementation at DRS Conference
Data Centres and Data Sharing Insights at ODE Final Meeting
Major Shifts in Mobile and Cloud Computing
Bohr's Model of an Atom in Inorganic Chemistry
Authorization Tokens for Science Collaboration and Security
Malware Obfuscation Techniques and Defenses
Network Security: Ethical Issues and Countermeasures
Semantic Web Ontology for GDPR Compliance & Data Lifecycles
Advanced Data Management Models and Policies
University Research Data Stewardship and Access Policy
Protect Your Family Business from Cyber Attacks with Vocational Educational Solutions
Comprehensive Guide to Successful CRM Implementation
NCEP EMC Global Model Verification and Diagnostic Tools Overview
Fostering & Adoption Service: Staff Engagement Briefing for Cumbria
Data Privacy and Sponsored Programs in Sponsored Agreements
Defense Against Multi-Channel Man-in-the-Middle Attacks in IEEE 802.11-17
Man-in-the-Middle Attacks and Mitigation Strategies
Advanced Techniques in Machine Learning
Binary Logistic Regression Analysis Workshop: Variables Selection and Model Interpretation
Naive Bayes and Basic Probability Concepts
Understand Logistic Regression for Effective Classification
Simulating COVID-19 Trial with Bayesian Analysis
1
2
3
4
5
6
7
8
9
10