Computer Laboratory

Results: 4525



#Item
471Cryptography / Computer network security / Computer security / Cyberwarfare / National security / Secure communication / Application security / Communications security / Wireless security / Software-defined radio / Advanced Learning and Research Institute / Software security assurance

NRL BAA Announcement # HIGH ASSURANCE ENGINEERING AND COMPUTING The Center for High Assurance Computer Systems of the Naval Research Laboratory (NRL) is seeking white papers for innovative research, advanced sys

Add to Reading List

Source URL: heron.nrl.navy.mil

Language: English - Date: 2016-02-17 10:17:54
472ISO standards / Common Criteria / Security Target / Evaluation / Tests / Computer security / Common Criteria Testing Laboratory / Crime prevention / Data security

Process for Empanelment and Operation of labs under IC3S (STQC/CC/D03) Issue : 03

Add to Reading List

Source URL: www.commoncriteria-india.gov.in

Language: English - Date: 2014-11-20 05:22:06
473Guang Gao / International Parallel and Distributed Processing Symposium / Open64 / International Federation for Information Processing / Computer architecture / Actor model / Parallel computing / Arvind / Ian F. Akyildiz

CAPSL Computer Architecture and Parallel Systems Laboratory Department of Electrical and Computer Engineering GUANG R. GAO University of Delaware

Add to Reading List

Source URL: www.capsl.udel.edu

Language: English - Date: 2015-02-12 15:30:49
474Inter-process communication / Parallel computing / Application programming interfaces / Message Passing Interface / Systems engineering / Message passing / Active message / MPICH / Middleware / Partitioned global address space / Computer cluster

Designing a Common Communication Subsystem? Darius Buntinas and William Gropp Mathematics and Computer Science Division Argonne National Laboratory {buntinas, gropp}@mcs.anl.gov

Add to Reading List

Source URL: wgropp.cs.illinois.edu

Language: English - Date: 2016-08-16 11:52:12
475Computer network security / Crime prevention / Cryptography / Information governance / National security / Ubiquitous computing / Mobile computing / Computer security / Internet privacy / Authentication / Ambient intelligence / Wireless LAN

Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Interactions V. Ramakrishna, Kevin Eustice and Matthew Schnaider Laboratory for Advanced Systems Research Computer Science Department Univers

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2006-07-13 17:06:00
476Transaction processing / Concurrency control / Data management / Transactional memory / Databases / Software transactional memory / Schedule / Lock

Good Programming in Transactional Memory Game Theory Meets Multicore Architecture Raphael Eidenbenz and Roger Wattenhofer Computer Engineering and Networks Laboratory (TIK), ETH Zurich, Switzerland {eidenbenz,wattenhofe

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Language: English - Date: 2015-05-18 12:16:06
477Networking hardware / Computer network / Telecommunications engineering / Local area network / Network interface controller / Oak Ridge National Laboratory / IP address

ORNL Neutron Scattering School S e p t e m b e r O a k R i d g e O a k

Add to Reading List

Source URL: neutrons2.ornl.gov

Language: English - Date: 2008-09-18 14:56:21
478File sharing / Distributed data storage / Network architecture / Peer-to-peer / Distributed hash table / Hash list / Clientserver model / Tiny Encryption Algorithm

Push-to-Pull Peer-to-Peer Live Streaming Thomas Locher, Remo Meier, Stefan Schmid, and Roger Wattenhofer Computer Engineering and Networks Laboratory (TIK), ETH Zurich, 8092 Zurich, Switzerland {lochert,remmeier,schmiste

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Language: English - Date: 2015-05-18 12:16:10
479Linux Foundation / University of Cambridge Computer Laboratory / Xen / Hypervisor / Hardware virtualization / Hyper-V / VMware / Kernel-based Virtual Machine / ALOHAnet / Virtual appliance / VMware ESXi

Exceliance - ALOHA Load-Balancer Memo ALOHA Virtual Appliance best practices

Add to Reading List

Source URL: www.haproxy.com

Language: English - Date: 2014-04-28 06:41:27
480Network architecture / Linux Foundation / University of Cambridge Computer Laboratory / Xen / Hyper-V / Open vSwitch / Hardware virtualization / Middlebox / Hypervisor / Live migration / Paravirtualization / Kernel-based Virtual Machine

ClickOS and the Art of Network Function Virtualization Joao Martins† , Mohamed Ahmed† , Costin Raiciu‡ , Vladimir Olteanu‡ , Michio Honda† , Roberto Bifulco† , Felipe Huici† † NEC Europe Ltd. ‡ Universi

Add to Reading List

Source URL: nets.cs.pub.ro

Language: English - Date: 2014-10-19 08:55:39
UPDATE