Battening Down / Greedy after this gossip / The town and river overflow
| Main Author: | Kinsella, John |
|---|---|
| Format: | Non traditional textual works |
| Published: |
The Manhattan Review
2011
|
| Online Access: | http://hdl.handle.net/20.500.11937/62470 |
Similar Items
A method of detecting whether the delignification of tile battens is a structural defect
by: Boughton, G., et al.
Published: (2024)
by: Boughton, G., et al.
Published: (2024)
Gossip, power and solidarity in Iranian men talk / Leila Mohajer
by: Leila, Mohajer
Published: (2013)
by: Leila, Mohajer
Published: (2013)
Greedy feature construction
by: Oglic, Dino, et al.
Published: (2016)
by: Oglic, Dino, et al.
Published: (2016)
Numerical study of irregular wave overtopping and overflow
by: Soliman, Akram S M
Published: (2003)
by: Soliman, Akram S M
Published: (2003)
Scale effect of storm sewage overflow structure
by: S. Y. Lim ,, et al.
Published: (1990)
by: S. Y. Lim ,, et al.
Published: (1990)
A gossip virtual social network for non playable characters in role play games
by: Perrie, Justin, et al.
Published: (2013)
by: Perrie, Justin, et al.
Published: (2013)
Learning from supervisor negative gossip: the reflective learning process and performance outcome of employee receivers
by: Bai, Yun, et al.
Published: (2019)
by: Bai, Yun, et al.
Published: (2019)
Deconstruction Overflowed: Doing Undoing from Philosophy's Outer Edge
by: Briggs, Robert
Published: (2023)
by: Briggs, Robert
Published: (2023)
Greedy heuristic for the workforce scheduling and routing problem
by: Russell, Samuel
Published: (2017)
by: Russell, Samuel
Published: (2017)
Buffer overflow attack mitigation via Trusted Platform Module (TPM)
by: Teh, Jia Yew, et al.
Published: (2014)
by: Teh, Jia Yew, et al.
Published: (2014)
"Since the mine closed down": mining town closures in the songs of Michael Thomas
by: Genoni, Paul
Published: (2002)
by: Genoni, Paul
Published: (2002)
Application of soft computing techniques to adaptive user buffer overflow control on the Internet
by: Lin, W., et al.
Published: (2006)
by: Lin, W., et al.
Published: (2006)
Cortical functioning in children with developmental coordination disorder: a motor overflow study
by: Licari, M., et al.
Published: (2015)
by: Licari, M., et al.
Published: (2015)
Risk based analysis for detention pond overflow at Iskandar Malaysia (Nusajaya), Johor
by: Suif, Zuliziana
Published: (2008)
by: Suif, Zuliziana
Published: (2008)
Dynamic control of urban sewer systems to reduce combined sewer overflows and their adverse impacts
by: Rathnayake, U., et al.
Published: (2019)
by: Rathnayake, U., et al.
Published: (2019)
Gossip column: should it be abolished / Aida Fatimah Abd. Jabar, Wan Jasmira Wan Ibrahim and Wan Nur Shafida Wan Hashim
by: Abd. Jabar, Aida Fatimah, et al.
Published: (2005)
by: Abd. Jabar, Aida Fatimah, et al.
Published: (2005)
Non-greedy minimum interference routing algorithm for bandwidth-guaranteed flows
by: Tan, Su Wei, et al.
Published: (2002)
by: Tan, Su Wei, et al.
Published: (2002)
The effects of CEO greediness and peer compensation on the quality of firms’ financial information
by: Alhossini, Abdullah A.
Published: (2024)
by: Alhossini, Abdullah A.
Published: (2024)
Greedy Interaction Elements Coverage Analysis for AI-Based T-Way Strategies
by: Kamal Z., Zamli, et al.
Published: (2013)
by: Kamal Z., Zamli, et al.
Published: (2013)
Bayesian Networks With
Greedy Backward Elimination In
Feature Selection For Data
Classification
by: Ang, Sau Loong
Published: (2019)
by: Ang, Sau Loong
Published: (2019)
Non-Greedy Routing And Admission Control Algorithm For Traffic Engineering In MPLS Networks
by: Tan , Su Wei
Published: (2002)
by: Tan , Su Wei
Published: (2002)
Non-Greedy Routing And Admission Control Algorithm For Traffic Engineering In MPLS Networks
by: Tan, Su Wei
Published: (2002)
by: Tan, Su Wei
Published: (2002)
A greedy heuristic for workforce scheduling and routing with time-dependent activities constraints
by: Castillo-Salazar, J. Arturo, et al.
Published: (2015)
by: Castillo-Salazar, J. Arturo, et al.
Published: (2015)
A variable combinatorial test suite strategy based on modified greedy algorithm
by: Homaid, Ameen A. Ba, et al.
Published: (2015)
by: Homaid, Ameen A. Ba, et al.
Published: (2015)
Routing problem in rectangular mesh network using Dijkstra’s based Greedy method
by: Noraziah, Adzhar, et al.
Published: (2018)
by: Noraziah, Adzhar, et al.
Published: (2018)
Adapting the Elitism on the Greedy Algorithm for Variable Strength Combinatorial Test Cases Generation
by: Bahomaid, Ameen A., et al.
Published: (2018)
by: Bahomaid, Ameen A., et al.
Published: (2018)
A GreedyZero algorithm to minimise the conflicts in an Optical Multistage Interconnection Network
by: Moudi, Mehrnaz, et al.
Published: (2014)
by: Moudi, Mehrnaz, et al.
Published: (2014)
GreedyZero algorithms for conflict-free scheduling in low stage interconnection network
by: Moudi, Mehrnaz, et al.
Published: (2015)
by: Moudi, Mehrnaz, et al.
Published: (2015)
In lieblicher Blaue: After Hölderlin
by: Kinsella, John
Published: (2016)
by: Kinsella, John
Published: (2016)
Bedenimed Cloud: an apostasy? After Mayakovsky
by: Kinsella, John
Published: (2011)
by: Kinsella, John
Published: (2011)
Routing problem in rectangular mesh network using shortest path based Greedy method
by: Noraziah, Adzhar, et al.
Published: (2019)
by: Noraziah, Adzhar, et al.
Published: (2019)
Routing problem in rectangular mesh network using shortest path based Greedy method
by: Noraziah, Adzhar, et al.
Published: (2019)
by: Noraziah, Adzhar, et al.
Published: (2019)
Mining stack overflow to recommend Java API classes using word embedding and topic modelling / Lee Wai Keat
by: Lee , Wai Keat
Published: (2019)
by: Lee , Wai Keat
Published: (2019)
Some greedy based algorithms for multi periods degree constrained minimum spanning tree problem
by: Wamiliana, Wamiliana, et al.
Published: (2015)
by: Wamiliana, Wamiliana, et al.
Published: (2015)
A greedy technique for finding the most reliable edge-disjoint-path-set in a network.
by: Loh, Rue-chze, et al.
Published: (2008)
by: Loh, Rue-chze, et al.
Published: (2008)
Minimizing makespan of a resource-constrained scheduling problem: a hybrid greedy and genetic algorithms
by: Mohd Ariffin, Mohd Khairol Anuar, et al.
Published: (2015)
by: Mohd Ariffin, Mohd Khairol Anuar, et al.
Published: (2015)
A proactive greedy routing protocol precludes sink-hole formation in wireless sensor networks
by: Mustafa, Mayada S. A., et al.
Published: (2022)
by: Mustafa, Mayada S. A., et al.
Published: (2022)
A source code perspective C overflow vulnerabilities exploit taxonomy based on well-defined criteria / Nurul Haszeli Ahmad
by: Ahmad, Nurul Haszeli
Published: (2015)
by: Ahmad, Nurul Haszeli
Published: (2015)
A novel Fuzzy Logic Controller (FLC) for shortening the TCP channel roundtrip time by eliminating user buffer overflow adaptively
by: Lin, W., et al.
Published: (2005)
by: Lin, W., et al.
Published: (2005)
The Light Echo of Supernova 1987A after David Malin
by: Kinsella, John
Published: (2008)
by: Kinsella, John
Published: (2008)
Similar Items
-
A method of detecting whether the delignification of tile battens is a structural defect
by: Boughton, G., et al.
Published: (2024) -
Gossip, power and solidarity in Iranian men talk / Leila Mohajer
by: Leila, Mohajer
Published: (2013) -
Greedy feature construction
by: Oglic, Dino, et al.
Published: (2016) -
Numerical study of irregular wave overtopping and overflow
by: Soliman, Akram S M
Published: (2003) -
Scale effect of storm sewage overflow structure
by: S. Y. Lim ,, et al.
Published: (1990)