Analyze

Results: 2323



#Item
711Computer network security / Network telescope / Border Gateway Protocol / Internet background noise / Darknet / Internet backbone / IP address / Denial-of-service attack / Router / Internet / Computing / Network architecture

Extracting Benefit from Harm: Using Malware Pollution to Analyze the Impact of Political and Geophysical Events on the Internet Alberto Dainotti Roman Ammann

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-04 19:24:46
712Cyberwarfare / Computer network security / Secure communication / National security / McAfee / Security information and event management / Data loss prevention software / Network security / Security event manager / Computer security / Security / Data security

Technology Blueprint InvestigatE Data Breaches Collect, analyze, and preserve security forensic information

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:04:53
713Eclipse software / JFace / Oak Ridge National Laboratory / Simulation / Eclipse / Analysis / Workflow / OSGi / Software / Computing / Standards organizations

Prevent Three-Eyed Fish: Analyze your Nuclear Reactor with Eclipse Jay Jay Billings, Research Staff Oak Ridge National Laboratory

Add to Reading List

Source URL: www.eclipsecon.org

Language: English - Date: 2014-06-18 19:20:44
714

With Network Timeout, a free web service and community for IT enthusiasts and professionals, you can access the latest technology from ExtraHop Networks: Upload packet captures and analyze them to identify problems quick

Add to Reading List

Source URL: www.extrahop.com

- Date: 2011-06-08 04:16:02
    715Markov processes / Categorical data / Econometrics / Latent class model / Expectation–maximization algorithm / Hidden Markov model / Markov chain / Latent variable / Markov property / Statistics / Markov models / Statistical models

    Using a Mixture Latent Markov Model to Analyze Longitudinal U.S. Employment Data Involving Measurement Error Jay Magidson,1 Jeroen K. Vermunt,2 and Bac Tran3 (1) Statistical Innovations Inc., Belmont, MA., U.S. (2) Depar

    Add to Reading List

    Source URL: statisticalinnovations.com

    Language: English - Date: 2008-01-24 10:25:02
    716Algorithm / Mathematical logic / Shortest path problem / Matching / Tree decomposition / Matroid / Combinatorics / Randomized algorithm / Mathematics / Theoretical computer science / Graph theory

    24 IP1 ”If You Can Specify It, You Can Analyze It” —The Lasting Legacy of Philippe Flajolet The ”Flajolet School” of the analysis of algorithms and

    Add to Reading List

    Source URL: www.siam.org

    Language: English - Date: 2012-12-18 10:42:32
    717Bayesian statistics / Statistical theory / Statistical inference / Bayesian inference / Statistical forecasting / Prior probability / Statistics / Information / Science

    A Bayesian two-part model applied to analyze risk factors of adult mortality in Namibia Lawrence N. Kazembe Department of Statistics and Population Studies, University of Namibia, Windhoek, Namibia: De

    Add to Reading List

    Source URL: www.statistics.gov.hk

    Language: English - Date: 2013-08-22 04:39:21
    718Pohang University of Science and Technology / Technology / Electronics / Numbers / Cooperative Association for Internet Data Analysis / KAIST / Internet

    초정밀 측정 및 분석 기술 연구 CASFI (Collect, Analyze, and Share for Future Internet): High-Precision Measurement and Analysis Research

    Add to Reading List

    Source URL: www.caida.org

    Language: English - Date: 2015-02-02 18:46:17
    719Public economics / Finance / Tax / Economics / AT&T / Redistribution of wealth / BT Group / Government debt / Economic policy / Public finance / Fiscal policy

    A Theory of Public Debt Overhang Keiichiro Kobayashi∗ February 2, 2013 Abstract In this paper we analyze the effects of unsustainable public debt on technology

    Add to Reading List

    Source URL: cis.ier.hit-u.ac.jp

    Language: English - Date: 2014-07-01 09:02:35
    720Programming language implementation / Real-time computing / Worst-case execution time / GNU Compiler Collection / Programming tool / Toolchain / C / Software / Computing / Compilers

    aiT for MPC755 aiT WCET Analyzers statically compute tight bounds for the worst-case execution time (WCET) of tasks in real-time systems. They directly analyze binary executables and take the intrinsic cache and pipeline

    Add to Reading List

    Source URL: www.absint.com

    Language: English - Date: 2015-01-19 06:15:30
    UPDATE