This document defines user needs and use cases that fall under the general umbrella of High Throughput Computing within the overall activities of XSEDE.National Science Foundation OCI-105357
This is a guideline outlining processes for incident response for security professionals at the serv...
The University Co-?op and college bookstores in The United States hav...
2012 S.C. Water Resources Conference - Exploring Opportunities for Collaborative Water Research, Pol...
This document is both a user-facing document (publicly accessible) and an internal working document ...
A position paper for the IMLS-funded National Forum, 'Always Already Computational - Collections as ...
What we will cover Brief review of programs with efficacy to reduce IPV / SV in educational settin...
This document defines user needs and use cases that fall under the general umbrella of High Performa...
“Community user” logins present special accounting and security issues. This policy is designed to e...
Script for presentation given at "Future of Technology" conference, 24 September 2010, Ann Arbor, Mi...
This document defines user needs and use cases that fall under the general umbrella of Data Analytic...
What we will cover Brief review of programs with efficacy to reduce IPV / SV in educational settin...
What we will cover Brief review of programs with efficacy to reduce IPV / SV in educational settin...
Marking the centenary of William S. Burroughs's birth, this exciting book reproduces the celebrated ...
A 74-year-old man presented to our Emergency Department with acute dyspnoea. His electrocardiogram s...
This document is both a user-facing document (publicly accessible) and an internal working document ...
This is a guideline outlining processes for incident response for security professionals at the serv...
The University Co-?op and college bookstores in The United States hav...
2012 S.C. Water Resources Conference - Exploring Opportunities for Collaborative Water Research, Pol...
This document is both a user-facing document (publicly accessible) and an internal working document ...
A position paper for the IMLS-funded National Forum, 'Always Already Computational - Collections as ...
What we will cover Brief review of programs with efficacy to reduce IPV / SV in educational settin...
This document defines user needs and use cases that fall under the general umbrella of High Performa...
“Community user” logins present special accounting and security issues. This policy is designed to e...
Script for presentation given at "Future of Technology" conference, 24 September 2010, Ann Arbor, Mi...
This document defines user needs and use cases that fall under the general umbrella of Data Analytic...
What we will cover Brief review of programs with efficacy to reduce IPV / SV in educational settin...
What we will cover Brief review of programs with efficacy to reduce IPV / SV in educational settin...
Marking the centenary of William S. Burroughs's birth, this exciting book reproduces the celebrated ...
A 74-year-old man presented to our Emergency Department with acute dyspnoea. His electrocardiogram s...
This document is both a user-facing document (publicly accessible) and an internal working document ...
This is a guideline outlining processes for incident response for security professionals at the serv...
The University Co-?op and college bookstores in The United States hav...
2012 S.C. Water Resources Conference - Exploring Opportunities for Collaborative Water Research, Pol...