Computer Applications

Results: 4069



#Item
251Computing / Computer architecture / Concurrent computing / Parallel computing / GPGPU / Graphics hardware / Computer networking / Digital signal processing / Throughput / Multi-core processor / Graphics processing unit / Packet processing

An Efficient Scheduling Approach for Concurrent Packet Processing Applications on Heterogeneous Systems Eva Papadogiannaki Sotiris Ioannidis

Add to Reading List

Source URL: womencourage.acm.org

Language: English - Date: 2016-08-09 09:13:53
252Software architecture / Computing / Cyberwarfare / Computer security / Computer network security / Web applications / Web development / Cross-site scripting / Application server / Web application security / Foundstone / Application security

Application Security and the SDLC Dan Cornell Denim Group, Ltd. www.denimgroup.com

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:20:31
253Simulation / Scientific modeling / Modeling and simulation / Scientific modelling / Social simulation / Agent-based model / Business process modeling / Computer simulation / DEVS / Systems engineering / Tuncer ren

Simulation Foundations, Methods and Applications Series Editor: Louis G. Birta, University of Ottawa, Canada Advisory Board: Roy E. Crosbie, California State University, Chico, USA

Add to Reading List

Source URL: www.site.uottawa.ca

Language: English - Date: 2015-04-16 09:11:55
254Software architecture / Integrated development environments / Application server / Web application / Java enterprise platform / Web framework / Uniface

A Visual Architectural Approach to Maintaining Web Applications Ahmed E. Hassan and Richard C. Holt School of Computer Science University of Waterloo 200 University Avenue West Waterloo, ON

Add to Reading List

Source URL: plg.uwaterloo.ca

Language: English - Date: 2003-01-23 11:47:24
255Artificial intelligence applications / Computational linguistics / Natural language processing / Question answering / Kvitt eller dubbelt

Passage Retrieval in a Question Answering System Juri Pyykk¨o, Rebecka Weegar, Pierre Nugues Lund University, Department of Computer Science SLund, Sweden , , pierre.nug

Add to Reading List

Source URL: www2.lingfil.uu.se

Language: English - Date: 2014-10-16 02:36:44
256Automatic identification and data capture / Computer printers / Business software / Point of sale / Retailing / Printer / Label / Printing / Barcode

Give Your Business A Lift! Printing Solutions for the Ski and Snowboard Industry Applications and Solutions:  Bar coding merchandise for sales and rentals

Add to Reading List

Source URL: www.cognitivetpg.com

Language: English - Date: 2012-11-01 14:09:40
257Computer access control / Automatic identification and data capture / User interface techniques / Markup languages / Speech synthesis / VoiceXML / Speaker recognition / Interactive voice response / Call Control eXtensible Markup Language / Authentication / Multi-factor authentication / Biometrics

DRAFT February, 2006 Speaker Identification and Verification Applications

Add to Reading List

Source URL: www.voicexml.org

Language: English - Date: 2015-06-05 20:40:12
258Darmstadt / Technische Universitt Darmstadt / Postdoctoral researcher / Technische Hochschule / Cryptography / Doctor of Philosophy / Habilitation / Center for Advanced Security Research Darmstadt

The Department of Computer Science of the Technische Universität Darmstadt invites applications for positions of Research Assistants in Cryptography and Complexity Theory both on doctoral and postdoctoral level, in the

Add to Reading List

Source URL: www.cryptoplexity.informatik.tu-darmstadt.de

Language: English - Date: 2016-08-19 22:14:13
259Alphabet Inc. / Cloud applications / Google Docs /  Sheets /  Slides and Forms / Presentation software / Google Search / Black box / Computer security / Mobile phone / Google

Superhero’s Black Box For Emergencies… What’s in Yours? Brenda Norris Jason Letourneau

Add to Reading List

Source URL: www.nc-sis.org

Language: English - Date: 2016-02-01 15:52:48
260Cloud infrastructure / Cloud applications / Crime prevention / Cryptography / National security / Cloud computing / Shadow IT / Software as a service / Information security / Dropbox / Computer security / Cloud computing security

Thought Leadership Shining a light into Shadow IT The story of Corporate IT unsurprisingly mirrors the introduction of innovative and

Add to Reading List

Source URL: www.nttsecurity.com

Language: English - Date: 2016-07-26 13:05:28
UPDATE