Architecture Analysis

Results: 1991



#Item
431Deep foundation / Structural system / Retaining wall / Engineering / Architecture / Building engineering / Geotechnical engineering / Structural engineering / Construction

geotechnical software It came from out of space Computer analysis gave

Add to Reading List

Source URL: www.oasys-software.com

Language: English - Date: 2011-07-13 16:26:06
432Costs / TruCluster / Tru64 UNIX / Oracle RAC / Oracle Database / Diskless shared-root cluster / Compaq / Total cost of ownership / Single system image / Computer architecture / Computing / Cluster computing

Total Economic Impact (TM) Analysis

Add to Reading List

Source URL: h30097.www3.hp.com

Language: English - Date: 2008-03-05 13:58:54
433Indian Institute of Management Ahmedabad / Modernist architecture / Indian Institutes of Management / Crore / Ahmedabad / Daily News and Analysis / Linguistics / Ravi J. Matthai / Education in Gujarat / States and territories of India / Education in Ahmedabad

Vikram Sarabhai Library, Indian Institute of Management IIMA in Media (June 30 –July 6, 2014) SR. NO.

Add to Reading List

Source URL: www.iimahd.ernet.in

Language: English - Date: 2014-07-11 04:26:55
434Network architecture / Network intrusion detection system / Denial-of-service attack / Intrusion detection system / Packet capture / Firewall / Router / Packet loss / Network forensics / Computer network security / Computing / Software

Enriching Network Security Analysis with Time Travel Gregor Maier Robin Sommer Holger Dreger

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-05-30 11:46:33
435Cloud infrastructure / Parallel computing / Hadoop / Distributed computing architecture / Apache Hadoop / Dataflow / MapReduce / Nutch / Dryad / Computing / Concurrent computing / Cloud computing

HiTune: Dataflow-Based Performance Analysis for Big Data Cloud Jinquan Dai, Jie Huang, Shengsheng Huang, Bo Huang, Yan Liu Intel Asia-Pacific Research and Development Ltd Shanghai, P.R.China, 200241 {jason.dai, jie.huang

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2011-05-02 15:48:10
436Knowledge / Centralized computing / Software architecture / JSON / Application programming interface / Insight / Cloud computing / Representational state transfer / Computing / Natural language processing / NetBase Solutions /  Inc.

S O C I A L M E D I A I N S I G H T & A N A LY S I S INSIGHT API Integrate Social Media Insight & Analysis into Your Applications Drive Smarter, Faster Business Decisions with an Efficient,

Add to Reading List

Source URL: cdn.netbase.com

Language: English - Date: 2013-12-15 16:05:36
437Building biology / Sustainable building / Architecture / Air pollution / Natural ventilation / Ecology / Lotka–Volterra equation / Mimicry / Ventilation / Heating /  ventilating /  and air conditioning / Fluid dynamics / Mathematical analysis

PDF Document

Add to Reading List

Source URL: www.urban.env.nagoya-u.ac.jp

Language: English - Date: 2015-03-11 00:03:12
438Mechanics / Statistical energy analysis / Ship construction / Vibration / Normal mode / Transparency and translucency / Modal analysis / Structural engineering / Naval architecture / Physics / Acoustics / Engineering

The Prediction of Structure-borne Noise Transmission in Ships Using Statistical Energy Analysis Y. K. Tso Department of Defence, Aeronautical and Maritime Research Laboratory - DSTO, Fishermens Bend, Victoria 3207, Austr

Add to Reading List

Source URL: www.acoustics.asn.au

Language: English - Date: 2011-05-02 00:52:18
439Instruction set architectures / QEMU / X86 architecture / Debugging / Virtual machine / Log analysis / X86-64 / Heisenbug / X86 / System software / Software / Computer architecture

Deterministic Replay and Reverse Debugging for QEMU P. Dovgalyuk Novgorod State University Institute for System Programming of the Russian Academy of Sciences

Add to Reading List

Source URL: www.linux-kvm.org

Language: English - Date: 2014-11-01 15:27:09
440Routing protocols / Routing / Border Gateway Protocol / Resource Public Key Infrastructure / Email spam / Router / Anycast / Spam / Multihoming / Internet / Network architecture / Computing

SPAMTRACER:   HOW  STEALTHY  ARE  SPAMMERS?   TRAFFIC  MONITORING  AND  ANALYSIS  (TMA)  2013   PIERRE-­‐ANTOINE  VERVIER,  OLIVIER  THONNARD    

Add to Reading List

Source URL: infocom.di.unimi.it

Language: English - Date: 2013-04-29 06:33:08
UPDATE