Computer configuration

Results: 1629



#Item
231Complexity classes / Graph connectivity / Reachability / Connected component / Transitive closure / SL / FO / Configuration graph / Connectivity / Theoretical computer science / Graph theory / Mathematics

Subcubic Algorithms for Recursive State Machines Swarat Chaudhuri Pennsylvania State University University Park, PA 16802, USA

Add to Reading List

Source URL: www.cs.rice.edu

Language: English - Date: 2008-03-07 16:10:53
232Universal Serial Bus / USB 3.0 / USB Attached SCSI / USB On-The-Go / USB / Computer hardware / LeCroy Corporation

For Immediate Release SuperSpeed USB New Voyager Analyzer Configuration offers Automated Verification at a Special Price Point Media contact:

Add to Reading List

Source URL: www.usb.org

Language: English - Date: 2010-04-05 20:04:51
233Interrupts / IBM PC compatibles / Computer buses / QEMU / X86 architecture / Virtual machines / IOMMU / Conventional PCI / PCI configuration space / System software / Computer architecture / Software

Intel Graphics Virtualization on KVM AugKVM Forum 2011 Rev. 3

Add to Reading List

Source URL: kvm.et.redhat.com

Language: English - Date: 2011-08-14 20:50:44
234Network performance / Proxy server / Internet / Menu bar / System software / PUM.bad.proxy / Web browsers / Opera Software / Proxy auto-config / Internet privacy / Computing / Computer networking

Configuration Directions for Mozilla Firefox  Go to the Library’s webpage www.library.unic.ac.cy

Add to Reading List

Source URL: www.library.unic.ac.cy

Language: English - Date: 2014-10-06 04:38:52
235Software / PCI Express / PCI configuration space / Conventional PCI / QEMU / Interrupt request / Advanced Configuration and Power Interface / PCI-X / Bochs / Computer hardware / Computer buses / Computing

PCI Express in QEmu Isaku Yamahata <> <> VA Linux Systems Japan K.K. KVM-forum 2010: August 10, 2010

Add to Reading List

Source URL: kvm.et.redhat.com

Language: English - Date: 2010-08-13 13:33:27
236Security Content Automation Protocol / CVSS / Vulnerability / Common Vulnerabilities and Exposures / Adobe Flash / Adobe Acrobat / Open Vulnerability and Assessment Language / Extensible Configuration Checklist Description Format / Metadata / Software / Computing / Computer security

Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence Preeti Subramanian Abstract

Add to Reading List

Source URL: www.secpod.com

Language: English - Date: 2015-04-02 06:08:19
237Internet / Network performance / Internet privacy / Proxy server / Checkbox / Internet Explorer / PUM.bad.proxy / Proxy auto-config / Computing / Software / Computer networking

Configuration Directions for Internet Explorer 6+  Go to the Library’s webpage www.library.unic.ac.cy

Add to Reading List

Source URL: www.library.unic.ac.cy

Language: English - Date: 2014-10-06 04:38:52
238Configuration management / Systems engineering / Nexteer Automotive / Computer-aided technologies / ISO 10303 / ProductCenter / Information technology management / Product lifecycle management / Technology

CM Trends 2012 Conference San Diego, CA AugustPresentation Abstracts & Speaker Biographies

Add to Reading List

Source URL: www.cmpic.com

Language: English - Date: 2012-09-18 16:08:29
239Computer architecture / Windows Server / Windows / Comparison of Microsoft Windows versions / Microsoft BackOffice Server / Microsoft Windows / Windows NT / Software

Sage BusinessVision 2010: Recommended System Configuration Microsoft Windows® 7 Microsoft Windows 7 is now available from Microsoft and is included on new computer systems. Windows 7 offers several improvements to secur

Add to Reading List

Source URL: www.wildwoodcanada.com

Language: English - Date: 2011-02-09 16:01:38
240Security / Data security / Risk analysis / Vulnerability / Threat / Asset / Countermeasure / Firewall / Attack / Computer network security / Cyberwarfare / Computer security

An Approach to Security Policy Configuration Using Semantic Threat Graphs Simon N. Foley and William M. Fitzgerald Cork Constraint Computation Centre, Computer Science Department, University College Cork, Ireland s.foley

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2009-07-27 08:02:51
UPDATE