Beyond Software

Results: 588



#Item
91Software engineering / Multi-core processor / Thread / OpenMP / Debugging / C / Computing / Computer programming / Parallel computing

Parallel Computing for Data Science with Examples in R and Beyond Norman Matloff University of California, Davis

Add to Reading List

Source URL: heather.cs.ucdavis.edu

Language: English - Date: 2014-02-08 19:48:57
92Social media / Web 2.0 / Real-time web / Facebook / Internet privacy / Privacy / Social networking service / Recommender system / Like button / World Wide Web / Computing / Software

Beyond Access Control: Managing Online Privacy via Exposure Mainack Mondal, Peter Druschel, Krishna P. Gummadi Alan Mislove

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2014-04-06 21:27:21
93Technology / Web 2.0 / Neologisms / Web 1.0 / Rabobank / Bank / Blog / Library 2.0 / Enterprise social software / World Wide Web / Social information processing / Computing

11 The Journal of Financial Services Technology Banking on Web 2.0 and Beyond: When Will We Meet

Add to Reading List

Source URL: www.jfst.com.au

Language: English - Date: 2009-10-18 22:39:08
94SPECvirt / Standard Performance Evaluation Corporation / Hyper-V / Virtualization / Benchmark / Hypervisor / Remote desktop / VMmark / Hardware virtualization / System software / Software / Virtual machines

Stimulating Virtualization Innovation SPECvirt_sc2013 and beyond Developed by the SPEC Virtualization Committee http://www.spec.org/virt_sc2013 Demonstrating Server Virtualization Technology – SPECvirt_sc2013

Add to Reading List

Source URL: icpe2015.ipd.kit.edu

Language: English - Date: 2015-03-03 04:31:44
95Functional analysis / Distribution / Interpretation / Divergence / Function / Constructible universe / Continuous function / Mathematical analysis / Mathematics / Generalized functions

Beyond Differential Privacy: Composition Theorems and Relational Logic for f -divergences between Probabilistic Programs Gilles Barthe and Federico Olmedo IMDEA Software Institute, Madrid, Spain {Gilles.Barthe,Federico.O

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English - Date: 2013-06-17 13:32:36
96Virtual globes / Keyhole Markup Language / GIS software / Google Earth / Web Map Service / Tropical Rainfall Measuring Mission / Google / Hierarchical Data Format / Computing / Software / Open Geospatial Consortium

9B.4 NASA PRECIPITATION DATA IN VIRTUAL GLOBES: MOVING BEYOND 2D REPRESENTATIONS Owen A. Kelley 1,2,3 and Erich F. Stocker 1 ,

Add to Reading List

Source URL: ams.confex.com

Language: English - Date: 2008-01-14 17:07:08
97Process management / Systems science / Scientific modeling / Software engineering / Business process modeling / Unified Modeling Language / Software development methodology / Business process / Process modeling / Systems engineering / Enterprise modelling / Science

Going beyond MDA: Business Process Modeling for Software Reuse Hafedh Mili1,2, Guitta Bou Jaoude1,2, Éric Lefebvre1,3, Guy Tremblay1,2 1 Laboratory for Research on Technologies for eCommerce (www.latece.uqam.ca)

Add to Reading List

Source URL: intra.info.uqam.ca

Language: English - Date: 2009-08-04 12:54:50
98Mobile telecommunications / Electronic engineering / 4G / 3GPP Long Term Evolution / LTE Advanced / 3G / NTT DoCoMo / 5G / W-CDMA / Technology / Software-defined radio / Mobile technology

IEEE Wireless Communications and Networking Conference (WCNC) 2015, Mar. 9-12, New Orleans 5G and Beyond Seizo ONOE

Add to Reading List

Source URL: wcnc2015.ieee-wcnc.org

Language: English - Date: 2015-03-26 19:51:43
99Libvirt / QEMU / Hypervisor / Xen / Cgroups / Hyper-V / LXC / Kernel-based Virtual Machine / System software / Software / Virtual machines

Libvirt: a virtualization API and beyond http://veillard.com/talks/CLKLinux2011.pdf

Add to Reading List

Source URL: veillard.com

Language: English - Date: 2011-10-15 10:50:27
100Advantage / Tiny Encryption Algorithm / Random oracle / 0K / Chosen-ciphertext attack / Cryptography / Optimal asymmetric encryption padding / Semantic security

Beyond Provable Security Verifiable IND-CCA Security of OAEP Gilles Barthe1 , Benjamin Gr´egoire2, Yassine Lakhnech3 , and Santiago Zanella B´eguelin1 1

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24
UPDATE