Computer Applications

Results: 4069



#Item
661Ambient intelligence / Ubiquitous computing / Database / X Window System / Computer security / Cloud computing / Middleware / Software / Computing / Database management systems

System Support for Pervasive Applications ROBERT GRIMM New York University and JANET DAVIS, ERIC LEMAR, ADAM MACBETH, STEVEN SWANSON, THOMAS ANDERSON, BRIAN BERSHAD, GAETANO BORRIELLO,

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2004-12-01 12:01:04
662Semantics / Categorization / Knowledge representation / Content-based image retrieval / Boosting methods for object categorization / Computer vision / Artificial intelligence / Artificial intelligence applications

Estimating scene typicality from human ratings and image features Krista A. Ehinger () Department of Brain & Cognitive Sciences, MIT, 77 Massachusetts Ave. Cambridge, MAUSA Jianxiong Xiao (jxiao@c

Add to Reading List

Source URL: cvcl.mit.edu

Language: English - Date: 2011-05-02 15:56:49
663Threat model / Cloud computing / Proprietary software / Threat / Asset / Platform as a service / Security / Computer security / Computing / Cyberwarfare

Threat Modeling Cloud Applications What You Don’t Know Will Hurt You Scott Matsumoto

Add to Reading List

Source URL: 2011.appsecusa.org

Language: English - Date: 2011-09-26 16:03:44
664Digital libraries / Library science / Museology / Graphics file formats / Electronic documents / PRONOM technical registry / Digital preservation / File format / Data conversion / Computer file formats / Computing / Preservation

A Framework for Understanding File Format Conversions Peter Bajcsy, Rob Kooper, Luigi Marini, Kenton McHenry and Michal Ondrejcek National Center for Supercomputing Applications (NCSA) University of Illinois at Urbana-Ch

Add to Reading List

Source URL: isda.ncsa.illinois.edu

Language: English - Date: 2011-08-16 15:54:20
665Electronic engineering / Electronics / Digital electronics / Computer buses / Quasi-bidirectional I/O / Motherboard / Integrated circuits / IC power supply pin / Power supply

WS2811 Signal line 256 Gray level 3 channal Constant current LED drive IC Feature Applications

Add to Reading List

Source URL: www.tweaking4all.com

Language: English - Date: 2014-01-03 12:52:03
666Local area networks / Virtual LAN / Ethernet / Computer architecture / Virtual Private LAN Service / IEEE 802.1 / Private VLAN / Metro Ethernet / Network architecture / IEEE 802 / Computing

D ATA S H E E T Ethernet Virtual Private LAN Service (ELAN) Communication between central and remote sites is made up of traffic from voice, video and data applications, and all require unique service topologies. Blueb

Add to Reading List

Source URL: bluebirdnetwork.com

Language: English - Date: 2013-04-10 17:59:51
667Computer graphics / Data conversion / Universal 3D / File format / STL / PRC / .3ds / PLY / Portable Document Format / Computing / Computer file formats / Graphics file formats

Towards a Universal, Quantifiable, and Scalable File Format Converter Kenton McHenry, Rob Kooper, Peter Bajcsy National Center for Supercomputing Applications University of Illinois at Urbana-Champaign, Urbana, IL {kmche

Add to Reading List

Source URL: isda.ncsa.illinois.edu

Language: English - Date: 2011-09-27 11:23:51
668Web 2.0 / Web applications / Internet search engines / MSN / Online chat / Skype / Hotmail / Yahoo! / Software / Computing / Microsoft

How to run BMW GT1 DIS or SSS system 1.Please insert the moveable hard disk into your computer USB port. E-mail: MSN:

Add to Reading List

Source URL: www.xcardiag.com

Language: English - Date: 2015-03-03 23:51:52
669Pure Storage / Virtualization / Desktop virtualization / Cloud computing / Hitachi / Converged storage / EMC Symmetrix / Computing / Computer hardware / Centralized computing

! Assuring Performance of I/O Intensive Applications With the VMTurbo Pure Storage Control Module GETTING THE MOST FROM VIRTUALIZATION?

Add to Reading List

Source URL: www.purestorage.com

Language: English - Date: 2015-04-14 10:43:18
670Electronic engineering / IEEE 802.1X / Wireless security / Fortinet / Wi-Fi / IEEE 802.11 / Wireless LAN / MIMO / Wireless access point / Computer network security / Computing / Technology

FortiAPTM-11C, 14C, 28C Secure Remote Access Points The Need for Secure Remote Access Points Enterprises are looking to increase productivity through uninterrupted access to applications and resources, without compromisi

Add to Reading List

Source URL: corex.at

Language: English - Date: 2015-05-13 12:08:51
UPDATE