Computer network operations

Results: 408



#Item
11Network theory / Operations research / Systems science / Science / Small-world network / Social network / Social simulation / Complex network

Pattern Analysis in Social Networks with Dynamic Connections Yu Wu1 and Yu Zhang2 1 Department of Computer Science

Add to Reading List

Source URL: wayneyuwu.com

Language: English - Date: 2016-07-13 12:24:42
12Neuroscience / Artificial neural networks / Computational neuroscience / Artificial intelligence / Cybernetics / Computer vision / Convolutional neural network / Image processing / Receptive field / MNIST database / Yann LeCun / Outline of object recognition

20th International Conference on Artificial Neural Networks (ICANN), Thessaloniki, Greece, SeptemberEvaluation of Pooling Operations in Convolutional Architectures for Object Recognition Dominik Scherer, Andreas M

Add to Reading List

Source URL: amueller.github.io

Language: English - Date: 2016-08-04 15:59:56
13Telecommunications engineering / Network performance / Network management / Probability theory / Operations research / Computing / Scientific modeling / Queueing theory / Discrete event simulation / Network simulation / Computer simulation / Traffic generation model

An efficient method for performance analysis of high speed networks : modeling and hardware emulation  Cyril Labb´e and Jean-Marc Vincent

Add to Reading List

Source URL: membres-lig.imag.fr

Language: English - Date: 2014-01-09 04:24:30
14Computing / Software / Computer architecture / Proprietary software / Network protocols / Network file systems / Server hardware / NetWare / Novell NetWare / GroupWise / Novell / AppleTalk

Official History of ISD Operations at ODP

Add to Reading List

Source URL: www.odplegacy.org

Language: English - Date: 2014-09-04 08:44:41
15Computing / Computer architecture / Business / Operations research / Network performance / Stochastic processes / Association for Computing Machinery / Queueing theory / Microsecond / Load / Null / Rate

programming pearls THE ENVELOPEIS BACK The February 1984 column was about “back-of-theenvelope” calculations. When you’re deciding whether to add a new command to a database system,

Add to Reading List

Source URL: www.eecs.harvard.edu

Language: English
16Graph theory / Mathematics / Combinatorial optimization / Computational complexity theory / Routing algorithms / Search algorithms / Operations research / Matching / A* search algorithm / Flow network

Overlays with preferences: Approximation algorithms for matching with preference lists Giorgos Georgiadis Department of Computer Science and Engineering Chalmers University of Technology SG¨oteborg, Sweden

Add to Reading List

Source URL: www.cse.chalmers.se

Language: English - Date: 2011-05-18 09:50:44
17Econometrics / Electronic design automation / Computational neuroscience / Computational statistics / Operations research / Simulation / Computer simulation / Artificial neural network / Regression analysis / Linear regression / Prediction / Synopsys

A Fast TCAD-based Methodology for Variation Analysis of Emerging Nano-Devices Hassan Ghasemzadeh Mohammadi∗ , Pierre-Emmanuel Gaillardon∗ , Majid Yazdani† , Giovanni De Micheli∗ Integrated Systems Laboratory∗ ,

Add to Reading List

Source URL: majid.yazdani.me

Language: English - Date: 2015-08-19 06:57:44
18Cybercrime / National security / Cyberwarfare / Computer security / Computer network security / Air Force Operational Test and Evaluation Center / 1st Information Operations Command

Microsoft PowerPoint - 0_(Warner)_Cyber_Training_Intro_v5.pptx

Add to Reading List

Source URL: www.dote.osd.mil

Language: English - Date: 2015-06-12 17:08:13
19Operations research / Edsger W. Dijkstra / Network theory / Shortest path problem / Mathematical optimization / Routing algorithms / Systems engineering / Dynamic programming

Local optimality in algebraic path problems (with help from Coq and Ssreflect) Timothy G. Griffin Computer Laboratory University of Cambridge, UK

Add to Reading List

Source URL: www.monmeetings.org

Language: English - Date: 2015-09-04 10:24:56
20Computer security / Computer network security / E-commerce / Cybercrime / EMC Corporation / RSA Security / Information security operations center / Security information and event management / Threat / RSA / Phishing / Draft:Threat Intelligence Analyst

RSA ADVANCED SECURITY OPERATIONS CENTER SOLUTION Pervasive Visibility, Rapid Detection, Effective Response OVERVIEW and behavior analysis models to detect and

Add to Reading List

Source URL: i.crn.com

Language: English - Date: 2016-06-29 17:01:32
UPDATE