Computer Applications

Results: 4069



#Item
461

Jerasure: A Library in C/C++ Facilitating Erasure Coding for Storage Applications James S. Plank∗ Technical Report CSDepartment of Electrical Engineering and Computer Science

Add to Reading List

Source URL: web.eecs.utk.edu

Language: English - Date: 2008-01-27 10:52:33
    462

    Chapter 16 GRAPH MINING APPLICATIONS TO SOCIAL NETWORK ANALYSIS Lei Tang and Huan Liu Computer Science & Engineering Arizona State University

    Add to Reading List

    Source URL: leitang.net

    Language: English - Date: 2010-02-11 13:01:49
      463Computing / Technology / Digital media / Computer science / Software / Application software / Cloud computing / Internet

      190500FY15 Technology Projects, Equipment, & Software Request Form Use this form to propose projects relating to information technology applications, equipment, or software that are not included in your departmental bud

      Add to Reading List

      Source URL: technology.spaces.wooster.edu

      Language: English - Date: 2013-11-05 12:46:47
      464

      Towards a Sybil-resilient reputation metric for P2P applications Tien Tuan Anh Dinh, Mark Ryan School of Computer Science, University of Birmingham, United Kingdom {ttd,mdr}@cs.bham.ac.uk Abstract In this paper, we propo

      Add to Reading List

      Source URL: www.cs.bham.ac.uk

      Language: English - Date: 2009-04-30 08:46:38
        465

        UNIVERSITY OF CALIFORNIA, SANTA CRUZ DEPARTMENT OF COMPUTER SCIENCE Assistant Professor Positions The Department of Computer Science at the University of California, Santa Cruz invites applications for two tenure track (

        Add to Reading List

        Source URL: apo.ucsc.edu

        Language: English - Date: 2015-12-22 20:48:08
          466

          Russian Federation and Republic of Belarus Union Program Development and Production of High-Performance Parallel-Architecture Computer (Supercomputers) Family and Supercomputer-Based Applications The SKIF K-1000 Superco

          Add to Reading List

          Source URL: skif.pereslavl.ru

          Language: English - Date: 2006-06-06 02:58:11
            467

            Extracting Kolmogorov Complexity with Applications to Dimension Zero-One Laws John M. Hitchcock∗ Department of Computer Science University of Wyoming

            Add to Reading List

            Source URL: www.cs.uwyo.edu

            Language: English - Date: 2007-11-07 22:44:58
              468Computer security / Computing / Cryptography / Computer network security / Trusted computing / IPsec / Cryptographic software / Cryptographic protocols / StrongSwan / Trusted Network Connect / IF-MAP / Internet Key Exchange

              The Linux Integrity Measurement Architecture and TPM-Based Network Endpoint Assessment Andreas Steffen ITA Institute for Internet Technologies and Applications HSR University of Applied Sciences Rapperswil CH-8640 Rapper

              Add to Reading List

              Source URL: www.strongswan.org

              Language: English - Date: 2012-08-29 15:32:53
              469

              2013 IEEE 37th Annual Computer Software and Applications Conference Big Data - Opportunities and Challenges Panel Position Paper Elisa Bertino Cyber Center, CERIAS and CS Department

              Add to Reading List

              Source URL: www.cs.purdue.edu

              Language: English - Date: 2014-07-28 12:34:42
                UPDATE