Computer bridge

Results: 435



#Item
251Land transport / Management / Louisiana Department of Transportation and Development / Transportation in Louisiana / Pavement management / Bridge management system / Asset management / Mainframe computer / Pontis / Transport / Bridges / Road transport

Louisiana DOTD How will the TAMP Infuence the Annual Highway Priority Program?

Add to Reading List

Source URL: www.iheep2014.com

Language: English - Date: 2015-01-22 17:50:02
252Bluetooth / In-car entertainment / Human–computer interaction / Telecommunications engineering / In car entertainment / Infotainment / MyLink / Technology

2k15_buick_encore_intelliLink_23206644A.ai (Modern Bridge - Level 2 / #[removed]Spine = Saddle Stitch Color = Black Date = [removed]

Add to Reading List

Source URL: www.buick.com

Language: English
253Infotainment / MyLink / OnStar / Computer icon / Bluetooth / Wireless / Technology / Vehicle telematics

2k15_buick_intelliLink_infotain_23199264B.ai (Modern Bridge - Level 2 / #[removed]Spine = Saddle Stitch Color = Black Date = [removed]

Add to Reading List

Source URL: www.buick.com

Language: English
254Antivirus software / Hacking / Malware / Password / Transaction authentication number / Wireless bridge / Whitelist / Vulnerability / Twitter / Computer security / Cyberwarfare / Computing

Internet of Things Security Evaluation Series HACKING LIGHTBULBS: SECURITY EVALUATION OF THE PHILIPS hue PERSONAL WIRELESS LIGHTING SYSTEM by NITESH DHANJANI

Add to Reading List

Source URL: www.dhanjani.com

Language: English - Date: 2013-08-13 10:44:54
255Teleconferencing / Internet culture / Electronic engineering / Cloud computing / Unified communications / Web conferencing / Unified messaging / Instant messaging / Cisco Systems / Videotelephony / Computing / Computer-mediated communication

HOSTED COLLABORATION SOLUTIONS FOR GOVERNMENT AGENCIES Confidently bridge the gap between premise-based solutions and cloud services Today’s increasingly dispersed and mobile workforce calls for increased IT efficiency

Add to Reading List

Source URL: www.meritalk.com

Language: English - Date: 2014-10-17 07:19:52
256In-car entertainment / Vehicle telematics / Mechanical engineering / Transport / Ford Motor Company / Technology / In car entertainment / Human–machine interaction / Steering wheel / Human–computer interaction

2k15_chev_city_express_infotain_23433685Aai (Modern Bridge - Level 2 / #[removed]Spine = Saddle Stitch Color = Black Date = [removed]

Add to Reading List

Source URL: www.chevrolet.com

Language: English
257Cyberwarfare / Computer security / HID Global / Entrust / Public key infrastructure / Digital signature / Smart card / Assa Abloy / Key management / Public-key cryptography / Security

IdenTrust, Part of HID Global, Cross-Certifies IdenTrust Global Common PKI Certificates with the U.S. Federal Bridge Authority News Highlights: •

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2014-10-29 15:02:10
258Computer-aided design / Data modeling / Real estate / Building engineering / Bim / Infrastructure asset management / Infrastructure / 4D BIM / Virtual design and construction / Building information modeling / Construction / Architecture

MPC[removed] | C. Clevenger, M. Ozbek, H. Mahmoud, and B. Fanning Impacts and Benefits of Implementing BIM on Bridge Infrastructure Projects A University Transportation Center sponsored by the U.S. Department of Transpor

Add to Reading List

Source URL: ntl.bts.gov

Language: English - Date: 2014-11-14 11:50:55
259Cybernetics / FIFO / Inter-process communication / Universal Serial Bus / USB 3.0 / Bus / USB flash drive / SystemC / Data buffer / Computer hardware / Electronic engineering / Computing

FT600/FT601 USB 3.0 to FIFO Bridge Version Draft Document No.: FT_001118 Clearance No.: FTDI#424 Future Technology

Add to Reading List

Source URL: www.ftdichip.com

Language: English - Date: 2014-11-10 18:02:24
260Theoretical computer science / Combinatorial optimization / Cut / Shortest path problem / Bridge / Computer security / Connectivity / Graph theory / Mathematics / Graph connectivity

Heat-ray: Combating Identity Snowball Attacks Using Machine Learning, Combinatorial Optimization and Attack Graphs John Dunagan Microsoft Research [removed]

Add to Reading List

Source URL: alicezheng.org

Language: English - Date: 2013-11-10 20:06:35
UPDATE