Computer network operations

Results: 408



#Item
201Grid computing / Cluster computing / Operations research / Scheduling algorithms / Job scheduler / MOSIX / Computer cluster / Scheduling / GLite / Concurrent computing / Computing / Parallel computing

A Truthful Heuristic for Efficient Scheduling in Network-Centric Grid OS

Add to Reading List

Source URL: is2.lse.ac.uk

Language: English - Date: 2007-05-15 09:41:54
202Graph coloring / Planning / Scheduling algorithms / Operations research / Time division multiple access / Network theory / Edge coloring / Channel access method / Scheduling / Graph theory / Mathematics / Theoretical computer science

870 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 3, JUNE 2009 Delay Aware Link Scheduling for Multi-Hop TDMA Wireless Networks

Add to Reading List

Source URL: www.comm.utoronto.ca

Language: English - Date: 2009-10-08 11:02:00
203Combinatorial optimization / Operations research / Network flow / Analysis of algorithms / Computational complexity theory / Time complexity / Shortest path problem / Cut / Flow network / Theoretical computer science / Mathematics / Applied mathematics

Hallucination Helps: Energy Efficient Virtual Circuit Routing Antonios Antoniadis∗ Benjamin Moseley§ Sungjin Im†

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2013-07-07 11:17:18
204Data security / Computer network security / McAfee / Companies listed on the New York Stock Exchange / Security information and event management / Vulnerability / Asset / Threat / Host Based Security System / Computer security / Security / Cyberwarfare

Solution Brief McAfee Security Management Get proactive—coordinate operations with real-time intelligence McAfee Security Management

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:03:54
205National security / Surveillance / Information technology management / Security operations center / Campaign for Nuclear Disarmament / Information Technology Infrastructure Library / Information security / Computer security / Security / Public safety

Building a SOC “Let us find your vulnerabilities before anyone else does.” Computer Network Defence Ltd’s (CND) Security Operations Centre (SOC) Service is a framework which provides clients with the design, delive

Add to Reading List

Source URL: www.cndltd.com

Language: English - Date: 2014-08-15 16:51:06
206Computational complexity theory / Mathematical optimization / Operations research / Submodular set function / Approximation algorithm / Wireless sensor network / Reduction / Genetic algorithm / Optimization problem / Theoretical computer science / Applied mathematics / Mathematics

Efficient Sensor Placement Optimization for Securing Large Water Distribution Networks Andreas Krause ∗

Add to Reading List

Source URL: www.select.cs.cmu.edu

Language: English - Date: 2009-08-13 03:47:05
207Computer network security / Academi / Currituck County /  North Carolina / Iraq War / Security guard / Private military company / Penetration test / Security / International Peace Operations Association / Private military contractors

The International Code of Conduct for Private Security Service Providers Signatory Companies New Signatory Companies on 1 April 2013 – Version with Company Details 1.

Add to Reading List

Source URL: www.icoc-psp.org

Language: English - Date: 2014-01-20 09:17:08
208Computer performance / Information technology management / Throughput / Query throughput / Apdex / Scalability / Measuring network throughput / Software performance testing / Computing / Network performance / Management

Performance requirements are supposed to be tracked from the system inception through the whole system lifecycle including design, development, testing, operations, and maintenance. However different groups of people are

Add to Reading List

Source URL: www.alexanderpodelko.com

Language: English - Date: 2011-11-27 01:17:42
209Search algorithms / Combinatorial optimization / Routing algorithms / Operations research / Network theory / A* search algorithm / Shortest path problem / Flow network / Tree / Graph theory / Mathematics / Theoretical computer science

Maximum Gain Round Trips with Cost Constraints Franz Graf, Hans-Peter Kriegel, Matthias Schubert arXiv:1105.0830v1 [cs.SI] 4 May 2011

Add to Reading List

Source URL: www.dbs.ifi.lmu.de

Language: English - Date: 2011-05-05 02:44:43
210Computer crimes / Computer network security / Crime prevention / Electronic commerce / National security / Radware / International Multilateral Partnership Against Cyber Threats / Computer security / Cyberwarfare / Ethics / Computing / Security

The Evolving Cybersecurity Environment: An Operations and Technology Perspective Panelists Jason M. Weinstein, Moderator

Add to Reading List

Source URL: gmm.ici.org

Language: English - Date: 2014-05-22 09:04:11
UPDATE