Computer lab

Results: 2386



#Item
211Wireless sensor network / Wireless networking / Sensor node / ANT / General-purpose input/output / Sensor web / Industrial Internet Consortium

Poster abstract: The FlockLab Testbed Architecture Jan Beutel, Roman Lim, Andreas Meier, Lothar Thiele, Christoph Walser, Matthias Woehrle, Mustafa Yuecel Computer Engineering and Networks Lab ETH Zurich, Switzerland

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Language: English - Date: 2015-05-18 12:15:56
212Cyberwarfare / Trojan horses / Spyware / Computer access control / Surveillance / Hacking Team / Exploit / Citizen Lab / Vupen / Morgan Marquis-Boire / FinFisher / Proxy server

The Citizen Lab Research Brief FebruaryMapping Hacking Team’s “Untraceable” Spyware

Add to Reading List

Source URL: citizenlab.org

Language: English - Date: 2015-03-18 14:57:35
213Vector calculus / Analytic geometry / Linear algebra / Matrices / 3D computer graphics / Matrix / Viewing frustum / Camera matrix / Euclidean vector / Transformation matrix / Cartesian coordinate system / Rotation

CS123 Lab 06 - Camtrans 1 Introduction

Add to Reading List

Source URL: cs.brown.edu

Language: English - Date: 2015-10-15 20:40:49
214Computer network security / Wireless networking / IEEE 802.11 / Wi-Fi / Cryptographic protocols / Wi-Fi Protected Access / Router / Wired Equivalent Privacy / Wardriving / Pharming / Computer security / Wireless router

WiFi networks and malware epidemiology Hao Hua,b, Steven Myersb, Vittoria Colizzac, and Alessandro Vespignanib,c,1 aDepartment of Physics, Indiana University, 727 East Third Street, Bloomington, IN 47405; bSchool of Info

Add to Reading List

Source URL: www.epicx-lab.com

Language: English - Date: 2012-09-08 12:43:38
215Classes of computers / Personal computing / Educational facilities / Classroom / Rooms / Laptop / Tablet computer

Spring 2017 General Assignment Rooms Building Lab

Add to Reading List

Source URL: registrar.osu.edu

Language: English - Date: 2016-08-16 07:38:34
216Computer access control / Computer network security / Statistical classification / Support vector machine / Password / Cryptographic nonce / Private biometrics / Authentication protocol / Challengeresponse authentication / Authentication / Biometrics / Man-in-the-middle attack

Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

Add to Reading List

Source URL: www.vast.uccs.edu

Language: English - Date: 2012-02-11 13:31:30
217Computer vision / Image registration / Medical imaging / Random walk / Watershed / Minimum spanning tree

ENHANCING ACCURACY OF SYMMETRIC RANDOM WALKER IMAGE REGISTRATION VIA A NOVEL DATA-CONSISTENCY MEASURE Lisa Y. W. Tang1,2 and Roger Tam2 and Ghassan Hamarneh1 1 Medical Image Analysis Lab., School of Computing Science, S

Add to Reading List

Source URL: www.cs.sfu.ca

Language: English - Date: 2016-02-06 13:56:22
218Phonology / Phonetics / Computational linguistics / Prosody / Systemic functional linguistics / Speech recognition / Speech synthesis / Deep learning / Prosodic unit / Intonation / Hidden Markov model / Stress

Detecting Emphasised Spoken Words by Considering Them Prosodic Outliers and Taking Advantage of HMM-Based TTS Framework 梁晖 (Hui LIANG) Speech Processing Group, Computer Engineering & Networks Lab, ETH Z¨urich, Switz

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Language: English - Date: 2016-02-23 05:32:58
219Computer access control / Computer network security / Statistical classification / Support vector machine / Password / Cryptographic nonce / Private biometrics / Authentication protocol / Challengeresponse authentication / Authentication / Biometrics / Man-in-the-middle attack

Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2012-02-11 13:31:30
220Polynomials / Polynomial / Root-finding algorithm / Kinetic data structure / Zero of a function / Polynomial interpolation / Polynomial greatest common divisor

Interval Methods for Kinetic Simulations Leonidas J. Guibas∗ Menelaos I. Karavelas∗ Graphics Lab., Computer Science Dept., Stanford University

Add to Reading List

Source URL: cs.smith.edu

Language: English - Date: 2003-11-07 21:14:28
UPDATE