Computer network

Results: 31604



#Item
11Journal of Network and Computer Applications, 25–43  Experimental studies on software tools to enhance accessibility to information in digital libraries Shigeo Sugimoto∗, Akira Maeda∗, Tetsuo Sakaguchi∗

Journal of Network and Computer Applications, 25–43 Experimental studies on software tools to enhance accessibility to information in digital libraries Shigeo Sugimoto∗, Akira Maeda∗, Tetsuo Sakaguchi∗

Add to Reading List

Source URL: www.eis.mdx.ac.uk

Language: English - Date: 2006-06-27 09:34:47
    12Secure Untrusted Data Repository (SUNDR) Jinyuan Li, Maxwell Krohn∗, David Mazi`eres, and Dennis Shasha NYU Department of Computer Science Abstract SUNDR is a network file system designed to store data

    Secure Untrusted Data Repository (SUNDR) Jinyuan Li, Maxwell Krohn∗, David Mazi`eres, and Dennis Shasha NYU Department of Computer Science Abstract SUNDR is a network file system designed to store data

    Add to Reading List

    Source URL: cs.nyu.edu

    Language: English - Date: 2006-10-10 04:45:29
      13Economics of Network Pricing with Multiple ISPs Srinivas Shakkottai R. Srikant  Dept. of Electrical and Computer Engineering, and

      Economics of Network Pricing with Multiple ISPs Srinivas Shakkottai R. Srikant Dept. of Electrical and Computer Engineering, and

      Add to Reading List

      Source URL: www.ece.tamu.edu

      Language: English - Date: 2004-12-22 13:09:16
        14Massachusetts Institute of Technology 6.857: Network and Computer Security Professor Ron Rivest Handout 6 April 22, 2014

        Massachusetts Institute of Technology 6.857: Network and Computer Security Professor Ron Rivest Handout 6 April 22, 2014

        Add to Reading List

        Source URL: courses.csail.mit.edu

        Language: English
          15Camera Network Calibration from Dynamic Silhouettes Sudipta N. Sinha Marc Pollefeys Leonard McMillan. Dept. of Computer Science, University of North Carolina at Chapel Hill. ssinha, marc, mcmillan  @cs.unc.edu

          Camera Network Calibration from Dynamic Silhouettes Sudipta N. Sinha Marc Pollefeys Leonard McMillan. Dept. of Computer Science, University of North Carolina at Chapel Hill. ssinha, marc, mcmillan  @cs.unc.edu

          Add to Reading List

          Source URL: www.cs.unc.edu

          Language: English - Date: 2004-04-29 14:32:16
            16Secure Untrusted Data Repository (SUNDR) Jinyuan Li, Maxwell Krohn∗, David Mazi`eres, and Dennis Shasha NYU Department of Computer Science Abstract SUNDR is a network file system designed to store data

            Secure Untrusted Data Repository (SUNDR) Jinyuan Li, Maxwell Krohn∗, David Mazi`eres, and Dennis Shasha NYU Department of Computer Science Abstract SUNDR is a network file system designed to store data

            Add to Reading List

            Source URL: www.usenix.org

            Language: English - Date: 2004-11-19 19:00:56
              17iii  Enhancing Censorship Resistance in the Tor Anonymity Network Philipp Winter Department of Mathematics and Computer Science

              iii Enhancing Censorship Resistance in the Tor Anonymity Network Philipp Winter Department of Mathematics and Computer Science

              Add to Reading List

              Source URL: nymity.ch

              Language: English - Date: 2017-08-25 13:31:01
              18Variational Deep Q Network  Alp Kucukelbir Department of Computer Science Columbia University

              Variational Deep Q Network Alp Kucukelbir Department of Computer Science Columbia University

              Add to Reading List

              Source URL: bayesiandeeplearning.org

              Language: English - Date: 2017-12-05 15:00:34
                19Measuring the Topic-Level Impact of Experts in Scholarly Network Lili Lin College of Computer and Information, Hohai University No.1 Xikang Road, Nanjing, 210098, Jiangsu, China

                Measuring the Topic-Level Impact of Experts in Scholarly Network Lili Lin College of Computer and Information, Hohai University No.1 Xikang Road, Nanjing, 210098, Jiangsu, China

                Add to Reading List

                Source URL: www.ieee-tcdl.org

                Language: English - Date: 2013-10-05 15:32:54
                  20Managing Computer Security Incident Response Teams (CSIRTs)  “Can you business survive and recover from network attacks and intruder threats?”

                  Managing Computer Security Incident Response Teams (CSIRTs) “Can you business survive and recover from network attacks and intruder threats?”

                  Add to Reading List

                  Source URL: www.pre-secure.com

                  Language: English - Date: 2002-11-01 16:30:46