Computer data

Results: 44615



#Item
951Computing / Computer security / Computer networking / Trusted computing / Computer network security / Cyberwarfare / Data security / Firewall / Trusted Execution Technology / Network address translation / Trusted Platform Module / Packet processing

ETTM: A Scalable Fault Tolerant Network Manager Colin Dixon Hardeep Uppal Vjekoslav Brajkovic Dane Brandon Thomas Anderson Arvind Krishnamurthy University of Washington Abstract In this paper, we design, implement, and e

Add to Reading List

Source URL: colindixon.com

Language: English - Date: 2012-04-28 16:29:27
952Geography of Michigan / Computer data / Data set / Detroit / Spreadsheet / Michigan / Local government in the United States

Data Driven Detroit Media Kit Our Services Data Collection &

Add to Reading List

Source URL: dev.datadrivendetroit.org

Language: English - Date: 2016-03-07 16:01:32
953Privacy / Information privacy / Data security / Data protection / European Data Protection Supervisor / Personally identifiable information / Computer security / Government / General Data Protection Regulation / Data Protection Act

PDF Document

Add to Reading List

Source URL: european-space-solutions.eu

Language: English - Date: 2016-05-24 12:00:15
954Software engineering / Computer programming / Computing / Data types / Functional languages / Type theory / Recursion / Functional programming / OCaml / Caml / Recursive data type / ML

Programovací jazyky F# a OCaml Chapter 4. Generic and recursive types Generic types

Add to Reading List

Source URL: tomasp.net

Language: English
955Computer hardware / Computer data storage / Laboratory equipment / Burbank /  California / Lockheed Corporation / Water pollution in the United States / Bung / Solid-state drive / California

NRO APPROVED FOR RELEASE 1 AUGUST 2015 BYECopy -2_ ofJune 1964

Add to Reading List

Source URL: www.nro.gov

Language: English - Date: 2015-08-10 12:56:14
956Computing / Software engineering / Memory management / C++ / Data types / Computer programming / Software bugs / Primitive types / C dynamic memory allocation / Garbage collection / Pointer / Heap

NV-Heaps: Making Persistent Objects Fast and Safe with Next-Generation, Non-Volatile Memories Joel Coburn Adrian M. Caulfield Ameen Akel

Add to Reading List

Source URL: mesl.ucsd.edu

Language: English - Date: 2011-04-30 02:44:38
957Security / Prevention / Safety / Data security / Crime prevention / Cryptography / Information governance / National security / Information security / Vulnerability / Computer security

lead security analyst reporting to – head of information security direct reports – IT security analyst working hours – full time is 35 hours a week. You’ll agree your working pattern with your manager. the purpo

Add to Reading List

Source URL: www.financialombudsman.org.uk

Language: English - Date: 2016-02-24 11:29:57
958Transaction processing / Computing / Data management / Data / Concurrency control / Fault-tolerant computer systems / Data synchronization / Replication / Transactional memory / Database transaction / Distributed transaction

Boosting STM Replication via Speculation Roberto Palmieri, Paolo Romano, Francesco Quaglia, Luis Rodrigues Roberto Palmieri – Workshop on Distributed Transactional Memory

Add to Reading List

Source URL: www.gsd.inesc-id.pt

Language: English - Date: 2012-02-23 10:20:44
959Archive formats / Astronomical imaging / Computing / Astronomy / Astronomical surveys / Computer programming / Digitized Sky Survey / Graphics file formats / National Geographic Society  Palomar Observatory Sky Survey / Palomar Observatory / IMG / Tar

THE DIGITIZED SKY SURVEY Discs 62–102 The Northern Hemisphere Mean Data Compression Factor: 10 These CD-ROMs were prepared by the Catalogs and Surveys Branch of

Add to Reading List

Source URL: archive.stsci.edu

Language: English - Date: 2007-01-09 14:01:50
960Wireless networking / Network performance / Computing / Telecommunications engineering / Media access control / Information theory / Data transmission / Packet radio / Duplex / Throughput / Exposed node problem / Transmission Control Protocol

RCTC: Rapid Concurrent Transmission Coordination in Full Duplex Wireless Networks Wenjie Zhou, Kannan Srinivasan and Prasun Sinha Department of Computer Science and Engineering The Ohio State University

Add to Reading List

Source URL: web.cse.ohio-state.edu

Language: English - Date: 2013-08-25 15:21:10
UPDATE