Computer network operations

Results: 408



#Item
291Route assignment / Transportation planning / Algorithm / AMPL / Flow network / Theoretical computer science / Operations research / Mathematics / Applied mathematics

Microsoft Word - Submitted Dissertation_10_29_Final.docx

Add to Reading List

Source URL: www.uctc.net

Language: English - Date: 2009-12-11 17:17:50
292Year of birth missing / Anna Nagurney / Isenberg School of Management / State University of New York at Oswego / Network economics

Preface The study of networks and their applications has had a long tradition in engineering, operations research/management science, and in computer science. More recently, the fields of finance and economics have come

Add to Reading List

Source URL: supernet.isenberg.umass.edu

Language: English - Date: 2006-07-25 07:15:40
293Operations research / Planning / Scheduling / Packet Processing / Fair queuing / Electronics / Throughput / Electronic engineering / Generalized processor sharing / Scheduling algorithms / Computer networking / Computing

Computer Networks[removed]–621 www.elsevier.com/locate/comnet Predictive scheduling of network processors Tilman Wolf a

Add to Reading List

Source URL: www.ecs.umass.edu

Language: English - Date: 2013-12-04 11:29:24
294Mathematics / Operations research / Combinatorial optimization / Global optimization / Robust optimization / Greedy randomized adaptive search procedure / Graph theory / Network science / Clique / Mathematical optimization / Theoretical computer science / Applied mathematics

Sergiy Butenko Curriculum Vitae October 2013 Address: 4037 Emerging Technologies Building, TAMU-3131, College Station, TX[removed]

Add to Reading List

Source URL: ise.tamu.edu

Language: English - Date: 2013-10-28 13:20:57
295Cyberwarfare / Propaganda techniques / Military science / Crowd psychology / Joint Information Operations Warfare Center / Psychological Operations / Computer network operations / Counter-terrorism / Electronic warfare / Information operations / Propaganda in the United States / Psychological warfare

■ Marine relaying information to USS Wasp.

Add to Reading List

Source URL: www.au.af.mil

Language: English - Date: 2012-01-04 10:20:26
296Graphical models / Database management systems / SQL / Operations research / Relational model / Query optimizer / Bayesian network / Relational algebra / FO / Mathematics / Applied mathematics / Theoretical computer science

Optimizing MPF Queries: Decision Support and Probabilistic Inference † Hector Corrada Bravo†

Add to Reading List

Source URL: www.cbcb.umd.edu

Language: English - Date: 2008-11-23 15:25:13
297Security / Unified threat management / Managed security service / Vulnerability / Threat / Firewall / Network security / Information security / Computer network security / Cyberwarfare / Computer security

Level 3 Managed Security Services Comprehensive Unified Threat Management Defending against cyber threats, protecting your operations, and safeguarding the information entrusted to your care is a large, complex, and cons

Add to Reading List

Source URL: caleidoscopesolutions.com

Language: English - Date: 2014-05-30 11:37:19
298Computer security / Counter-intelligence / Counterintelligence / Intelligence analysis / Military intelligence / Operations security / Information security / Network security / United States Department of Homeland Security / Security / National security / Espionage

INSIDER THREAT PROGRAM TRAINING COURSE

Add to Reading List

Source URL: www.insiderthreatdefense.com

Language: English - Date: 2014-07-13 14:18:04
299Information operations / War / Electronic warfare / Hacking / Information warfare / Computer network operations / Chinese Information Operations and Information Warfare / Cyber Operations / Cyberwarfare / Military science / Military intelligence

Microsoft Word - FINAL_USCC_PRC_Cyber_Capabilities_Study.docx

Add to Reading List

Source URL: www2.gwu.edu

Language: English - Date: 2013-04-25 12:01:59
300Cyberwarfare / Spyware / Internet privacy / Internet / Malware / Computer security / Privacy / Password / Norton Internet Security / Computer network security / Espionage / Security

[removed]   Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU[removed]

Add to Reading List

Source URL: scis.nova.edu

Language: English - Date: 2013-10-17 20:33:12
UPDATE