Computer Applications

Results: 4069



#Item
291Computer access control / ESET / Authentication / Multi-factor authentication

ESET Secure Authentication provides native support for a variety of Microsoft Web Applications Benefits of the SDK

Add to Reading List

Source URL: static5.esetstatic.com

Language: English - Date: 2014-04-15 07:11:25
292Global Positioning System / Cellport Systems / On-board diagnostics / Telematics / Vehicle bus / Computer security / IMS security / Vehicle tracking system

A system and a method for controlling use by applications of proprietary resources within a secure telematics system in a vehicle - European Patent Office - EPB1 A system and a method for controll

Add to Reading List

Source URL: cellport.com

Language: English - Date: 2014-03-20 15:39:53
293Parallel computing / Apache Hadoop / Data-intensive computing / MapReduce / Computer cluster / Google File System / Big data / Jumbune / Distributed file system for cloud

DELMA: Dynamically ELastic MApReduce Framework for CPU-Intensive Applications Zacharia Fadika 1 , Madhusudhan Govindaraju 2 Department of Computer Science, State University of New York (SUNY) at Binghamton 1

Add to Reading List

Source URL: www.cs.binghamton.edu

Language: English - Date: 2013-07-27 18:16:18
294Computer network security / Hacking / Code audit / Information technology audit / Vulnerability / Cross-site scripting / SQL injection / Web application security / Code injection / Uncontrolled format string / Application security / Computer security

Finding Security Vulnerabilities in Java Applications with Static Analysis Benjamin Livshits and Monica S. Lam Computer Science Department

Add to Reading List

Source URL: suif.stanford.edu

Language: English - Date: 2005-09-25 18:44:49
295Programming paradigms / Fault-tolerant computer systems / Distributed algorithms / Process / Concurrent computing / Parallel computing / Event-driven programming / Snapshot / Event / Complex event processing / Object Process Methodology / Thread

InContext: Simple Parallelism for Distributed Applications Sunghwan Yoo1 , Hyojeong Lee1 , Charles Killian1 , and Milind Kulkarni2 1 Department of Computer Science, 2 School of Electrical and Computer Engineering

Add to Reading List

Source URL: www.macesystems.org

Language: English - Date: 2011-10-20 22:04:49
296ITunes / Video editing software / IWork / ILife / IMovie / Property list / Computer file / File system / IPhoto / Thread / AppleScript / File locking

A File is Not a File: Understanding the I/O Behavior of Apple Desktop Applications Tyler Harter, Chris Dragga, Michael Vaughn, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau Department of Computer Sciences University

Add to Reading List

Source URL: www.sigops.org

Language: English - Date: 2011-09-11 16:39:10
297Machine vision / Telecentric lens / Computer vision / Automated X-ray inspection / Automation

creative engineering and manufacturing Machine vision solutions From image processing algorithms to optical installations, idonus provides partial or full machine vision solutions. Typical applications include high-thro

Add to Reading List

Source URL: www.idonus.com

Language: English - Date: 2016-06-06 12:21:45
298Clientserver model / Inter-process communication / Network architecture / Client-side / WHOIS / Application server / Form

Verena: End-to-End Integrity Protection for Web Applications Nikolaos Karapanos1 , Alexandros Filios1 , Raluca Ada Popa1, 2 , and Srdjan Capkun1 1 Dept. of Computer Science

Add to Reading List

Source URL: people.eecs.berkeley.edu

Language: English - Date: 2016-08-03 22:14:41
299Vision / Contrast / Photometry / Rho

Supplementary Formulas for Video Quality Assessment for Computer Graphics Applications Tunc¸ Ozan Aydın∗ ˇ ık∗ Martin Cad´

Add to Reading List

Source URL: zurich.disneyresearch.com

Language: English - Date: 2011-11-06 08:59:20
UPDATE