Computer Applications

Results: 4069



#Item
711Logic in computer science / Functional programming / Monad / Rewriting / ALGOL 68 / Software engineering / Programming language theory / Computing

Comingle: Distributed Logic Programming for Decentralized Android Applications Edmund S. L. Lam and Iliano Cervesato March 2015 CMU-CSCMU-CS-QTR-125

Add to Reading List

Source URL: reports-archive.adm.cs.cmu.edu

Language: English - Date: 2015-03-05 12:04:45
712Technology / Wireless security / IEEE 802.11 / Wireless LAN / Telecommunications engineering / Computing / O2 wireless box / Wireless networking / Computer network security / Wi-Fi

Easy Wi-Fi Connectivity for Smart Home, M2M & CleanTech applications! PageProduct Brief SPB820/HDG820, Wireless LAN

Add to Reading List

Source URL: www.hdwireless.se

Language: English - Date: 2015-05-29 04:28:07
713Wireless security / IEEE 802.11 / Internet protocol suite / Wireless networking / Technology / Wireless / Computer networking / Cracking of wireless networks / Windows Vista networking technologies / Wi-Fi / Computer network security / Computing

Easy Wi-Fi Connectivity for Smart Home, M2M & CleanTech applications! PageProduct Brief SPB800, Wireless LAN

Add to Reading List

Source URL: www.hdwireless.se

Language: English - Date: 2014-09-24 04:22:47
714Image processing / Image search / Artificial intelligence applications / Visual descriptors / Content-based image retrieval / Segmentation / Feature / Gazetteer / Geographic information system / Computer vision / Artificial intelligence / Vision

A Hierarchical, Multi-modal Approach for Placing Videos on the Map using Millions of Flickr Photographs Pascal Kelm Sebastian Schmiedeke

Add to Reading List

Source URL: elvera.nue.tu-berlin.de

Language: English - Date: 2011-09-15 03:39:53
715Videotelephony / Web conferencing / Cloud applications / Social information processing / Content management systems / Acquia / Drupal / WebEx / Cisco Systems / Software / Computing / Computer-mediated communication

Magic Quadrant for Social Software in the Workplace

Add to Reading List

Source URL: www.we-conect.com

Language: English - Date: 2015-02-12 19:04:52
716Electronic engineering / IEEE 802.1X / Wireless security / Fortinet / Wi-Fi / IEEE 802.11 / Wireless LAN / MIMO / Wireless access point / Computer network security / Computing / Technology

FortiAPTM-11C, 14C, 28C Secure Remote Access Points The Need for Secure Remote Access Points Enterprises are looking to increase productivity through uninterrupted access to applications and resources, without compromisi

Add to Reading List

Source URL: corex.at

Language: English - Date: 2015-05-13 12:09:33
717Sportsnet / Television / Sports media / Sportsnet One / John Shorthouse / Rogers Communications / Television in Canada / NBC Sports

! For Immediate ReleaseONETWOSEE AND CANADA’S SPORTSNET EXTEND AGREEMENT TO PROVIDE ADVANCED FAN ENGAGEMENT TECHNOLOGY AND PRODUCTS FOR MOBILE, TABLET AND PERSONAL COMPUTER FOR MLB GAMES Applications to Enhanc

Add to Reading List

Source URL: onetwosee.com

Language: English - Date: 2015-05-26 13:12:09
718Distributed computing architecture / MongoDB / NoSQL / Structured storage / Trusted Computing / Serialization / Multilevel security / XTS-400 / Data management / Computing / Computer security

FriendStar: Extensible Web Applications with Information Flow Control Amit Levy Ali Mashtizadeh Stanford University 1

Add to Reading List

Source URL: www.amitlevy.com

Language: English - Date: 2012-07-22 12:12:57
719Server hardware / Relational database management systems / Dell PowerEdge / Microsoft SQL Server / OpenManage / Solid-state drive / Microsoft Servers / Intel / Dell / Computing / Computer hardware / Technology

DATABASE PERFORMANCE AND RESILIENCY IN THE INTEL PROCESSORPOWERED DELL POWEREDGE R630 RUNNING MICROSOFT SQL SERVERWhen selecting a server for running your applications, a number of factors come into play, such as

Add to Reading List

Source URL: i.dell.com

Language: English - Date: 2015-03-20 11:48:58
720Software testing / Computer network security / Cross-site scripting / Cross-site request forgery / Plug-in / Application security / Penetration test / Vulnerability / SQL injection / Cyberwarfare / Computer security / Computing

Prevoty Plug-ins: Application Security for Legacy Applications The frequency and impact of hacking attempts against websites and applications continue to rise to unprecedented levels, creating significant challenges for

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2015-06-04 23:45:13
UPDATE